)]}'
{
  "commit": "1de58193310572808e6aad2f4226a5341f12560a",
  "tree": "6ecb0ca77cfc6d644523fab511f38651ef16ff0a",
  "parents": [
    "9a630bf31b130e29e0f27d6036631e61a3c43135"
  ],
  "author": {
    "name": "dschinazi",
    "email": "dschinazi@google.com",
    "time": "Wed Nov 25 14:46:08 2020 -0800"
  },
  "committer": {
    "name": "Copybara-Service",
    "email": "copybara-worker@google.com",
    "time": "Wed Nov 25 14:46:52 2020 -0800"
  },
  "message": "Prevent buffer overflow in QuicSimpleServerSession::HandleRstOnValidNonexistentStream\n\nThis fix is based on code from \u003cliujiyong4@gmail.com\u003e, thanks to them for reporting the issue and proposing a fix.\n\nThe issue here was that this code was using DCHECKs to validate input from the network instead of failing gracefully. QuicSimpleServerSession is not used in production so this code does not require flag protection.\n\nPiperOrigin-RevId: 344319749\nChange-Id: Ic0f14412ea5e2b398b48cb3d2333c2e1e01d6d35\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "72d6259fdff5fb9bc012c2738e070f2737fa58ba",
      "old_mode": 33188,
      "old_path": "quic/tools/quic_simple_server_session.cc",
      "new_id": "dd0e5ade037e91d389ebd05a69332185dad2958d",
      "new_mode": 33188,
      "new_path": "quic/tools/quic_simple_server_session.cc"
    }
  ]
}
