)]}'
{
  "commit": "168777fbc49296eeb54b5da8fc7dfcae1a4d3e27",
  "tree": "d134783a640f3f3ff9c621818e53d745fa519173",
  "parents": [
    "c361e279402ec359834b7eaa7d737462d02675e1"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Fri Dec 13 16:37:42 2024 -0500"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Thu Dec 19 10:06:14 2024 -0800"
  },
  "message": "Fix a theoretical overflow in BIO_printf\n\nFound by code inspection. If vsnprintf wanted to write INT_MAX\ncharacters, allocating a INT_MAX + 1 scratch buffer will overflow. Since\nwe always have INT_MAX \u003c SIZE_MAX, just casting to size_t earlier avoids\nthis.\n\n(If the malloc implementation is unwilling to allocate INT_MAX + 1,\ne.g. it is forbidden to on 32-bit, that\u0027s malloc\u0027s responsibility to\ndetect.)\n\nChange-Id: I3c2a740ebc7ecd58464a9f63858ffcefe67f648f\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/74247\nAuto-Submit: David Benjamin \u003cdavidben@google.com\u003e\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "37f4510ab2b8b6c9113735d4cea12b9096156d73",
      "old_mode": 33188,
      "old_path": "crypto/bio/printf.cc",
      "new_id": "4ad3546f6a18215a82d0e2d085a084473f254b72",
      "new_mode": 33188,
      "new_path": "crypto/bio/printf.cc"
    }
  ]
}
