)]}'
{
  "commit": "07d353680fa7d96e77ba93382deddd030793def4",
  "tree": "f9bf9a5060546f2ea913d05f22e47bac522b7021",
  "parents": [
    "a5ab818854d1adf6ee866f768b47f6162f4ca0a9"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Tue Jan 31 15:18:56 2023 -0500"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Wed Feb 01 14:42:33 2023 +0000"
  },
  "message": "Fix leak on invalid input to a2i_GENERAL_NAME.\n\nAlso add some tests for this syntax. The error-handling here is slightly\nsubtle. Although we do call GENERAL_NAME_free on the temporary\nGENERAL_NAME on error, GENERAL_NAME\u0027s value is freed based on the\ntype field. That means if you add an object to the value but don\u0027t set\nthe type, it won\u0027t be freed.\n\nOnly the OTHERNAME codepath was affected by this, and a malloc\nfailure-only case in the is_string path. I\u0027ve gone ahead and reworked\nall the paths so setting the type happens at the same time as setting\nthe value, so this invariant is more locally obvious.\n\nThis only impacts the unsafe, stringly-typed extensions-building APIs\nthat no one should be using anyway.\n\nBug: oss-fuzz:55569\nChange-Id: I6390e4ac1142264cdc86f95fd850f1b8f81e3fc9\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/56725\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\nCommit-Queue: David Benjamin \u003cdavidben@google.com\u003e\nAuto-Submit: David Benjamin \u003cdavidben@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "63ce092a3956056539d34c65d4647338bf8f21a3",
      "old_mode": 33188,
      "old_path": "crypto/x509/x509_test.cc",
      "new_id": "0928d466b9a374107d4bed73fc34677235a6808f",
      "new_mode": 33188,
      "new_path": "crypto/x509/x509_test.cc"
    },
    {
      "type": "modify",
      "old_id": "660ced5828fdc4a9c8a101297929ff3717be837e",
      "old_mode": 33188,
      "old_path": "crypto/x509v3/v3_alt.c",
      "new_id": "f10c1ce2ec8c4964738df4501c2ef795621f8859",
      "new_mode": 33188,
      "new_path": "crypto/x509v3/v3_alt.c"
    }
  ]
}
