)]}'
{
  "commit": "d87021d2467fca449d98f1251ddc3c87b9b97f30",
  "tree": "620d3b72640a66ed8d53ac5a55170bb4b946619d",
  "parents": [
    "184494dfccbf854212a82e230465b98ea1e86afe"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@chromium.org",
    "time": "Tue Jun 16 11:51:15 2015 -0400"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@google.com",
    "time": "Tue Jun 16 19:07:15 2015 +0000"
  },
  "message": "Fix length checks in X509_cmp_time to avoid out-of-bounds reads.\n\nAlso tighten X509_cmp_time to reject more than three fractional\nseconds in the time; and to reject trailing garbage after the offset.\n\nCVE-2015-1789\n\n(Imported from upstream\u0027s 9bc3665ac9e3c36f7762acd3691e1115d250b030)\n\nChange-Id: I2091b2d1b691c177d58dc7960e2e7eb4c97b1f69\nReviewed-on: https://boringssl-review.googlesource.com/5124\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "2ba9c84ac64dca874d4a0979012625bb50d8ef17",
      "old_mode": 33188,
      "old_path": "crypto/x509/x509_vfy.c",
      "new_id": "f53f279d654e549c3c025ce2a429706f433b9583",
      "new_mode": 33188,
      "new_path": "crypto/x509/x509_vfy.c"
    }
  ]
}
