)]}'
{
  "commit": "6afef8b1fb679df7d6a8606d713192c9907b1890",
  "tree": "e2113ce4f8371a8491c69ecce082509a4b71388a",
  "parents": [
    "d1094383df07cc8ae266c04cf3ace782447b4d5b"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Mon Mar 14 15:03:07 2016 -0400"
  },
  "committer": {
    "name": "Dr. Stephen Henson",
    "email": "steve@openssl.org",
    "time": "Thu Apr 07 19:22:20 2016 +0100"
  },
  "message": "Fix memory leak on invalid CertificateRequest.\n\nFree up parsed X509_NAME structure if the CertificateRequest message\ncontains excess data.\n\nThe security impact is considered insignificant. This is a client side\nonly leak and a large number of connections to malicious servers would\nbe needed to have a significant impact.\n\nThis was found by libFuzzer.\n\nReviewed-by: Emilia Käsper \u003cemilia@openssl.org\u003e\nReviewed-by: Stephen Henson \u003csteve@openssl.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "73f54bcb96c7b4a67029b3f98a57fbeb64e75d84",
      "old_mode": 33188,
      "old_path": "ssl/statem/statem_clnt.c",
      "new_id": "4806e6782b63eafdf08347b2c5999e33443d008a",
      "new_mode": 33188,
      "new_path": "ssl/statem/statem_clnt.c"
    }
  ]
}
