)]}'
{
  "commit": "c46ecc3a55bcbbe4ff31da3864d015e343b0189f",
  "tree": "9596e19677fc82e9605006d8f35320bfd32ec52d",
  "parents": [
    "7388b43cae035484036f5dc46c231ce6282a1367"
  ],
  "author": {
    "name": "Dr. Stephen Henson",
    "email": "steve@openssl.org",
    "time": "Thu May 10 16:03:52 2012 +0000"
  },
  "committer": {
    "name": "Dr. Stephen Henson",
    "email": "steve@openssl.org",
    "time": "Thu May 10 16:03:52 2012 +0000"
  },
  "message": "Sanity check record length before skipping explicit IV in TLS 1.2, 1.1 and\nDTLS to fix DoS attack.\n\nThanks to Codenomicon for discovering this issue using Fuzz-o-Matic\nfuzzing as a service testing platform.\n(CVE-2012-2333)\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "8425bb37eaf87c465ee1e420104acca0637cf157",
      "old_mode": 33188,
      "old_path": "CHANGES",
      "new_id": "2656e6616e0f45297f8c6166e0b75405be295736",
      "new_mode": 33188,
      "new_path": "CHANGES"
    },
    {
      "type": "modify",
      "old_id": "becbab91c219617452c9bacda251dadaf93331ee",
      "old_mode": 33188,
      "old_path": "ssl/d1_enc.c",
      "new_id": "07a5e97ce5cda574154f7a91b3906e765a1692f7",
      "new_mode": 33188,
      "new_path": "ssl/d1_enc.c"
    },
    {
      "type": "modify",
      "old_id": "201ca9ad6de20299a52870bf85257357fb1ae43b",
      "old_mode": 33188,
      "old_path": "ssl/t1_enc.c",
      "new_id": "f7bdeb3b9dbac573ff9539dc8638aab45b8df432",
      "new_mode": 33188,
      "new_path": "ssl/t1_enc.c"
    }
  ]
}
