)]}'
{
  "commit": "471a7be7a042e95e440f5de969c9765214ae8d6e",
  "tree": "328c7850f1499ddb2758b7407c1096a8ec62899b",
  "parents": [
    "19973b6ad9863a56f5c5fbcfd90e20ab2490a2c2"
  ],
  "author": {
    "name": "Wolfgang Denk",
    "email": "wd@denx.de",
    "time": "Sat Oct 28 01:14:32 2006 +0200"
  },
  "committer": {
    "name": "Wolfgang Denk",
    "email": "wd@denx.de",
    "time": "Sat Oct 28 01:14:32 2006 +0200"
  },
  "message": "Check for illegal character \u0027\u003d\u0027 in environment variable names.\n\nMake sure the string passed as variable name does not contain a \u0027\u003d\u0027\ncharacter. This not only prevents the common error or typing\n\"setenv foo\u003dbar\" instead of \"setenv foo bar\", but (more importantly)\nalso closes a backdoor which allowed to delete write-protected\nenvironment variables, for example by using \"setenv ethaddr\u003d\".\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "6257fbd23e6d0703213bcc59b14a487bf52f4707",
      "old_mode": 33188,
      "old_path": "common/cmd_nvedit.c",
      "new_id": "d3f50f87f352287a1dc1a082f3593697160da5d4",
      "new_mode": 33188,
      "new_path": "common/cmd_nvedit.c"
    }
  ]
}
