)]}'
{
  "commit": "dec17c2e4ad427824314fc283d719fa68026d321",
  "tree": "4986cd4e284462a18cc20b7cf53a2ed83880de23",
  "parents": [
    "dda9881f1194004004b1cfc625462687babbd66a"
  ],
  "author": {
    "name": "wub",
    "email": "wub@google.com",
    "time": "Thu Jun 04 13:13:50 2020 -0700"
  },
  "committer": {
    "name": "Copybara-Service",
    "email": "copybara-worker@google.com",
    "time": "Thu Jun 04 13:14:27 2020 -0700"
  },
  "message": "Fix gfe_quic_fuzzer.\n\nThis change has two fixes. One is a mem leak in the fuzzer. The other one is a buffer overrun in QuicFramer::EncryptPayload, when the packet\u0027s length is smaller than the associated data length.\n\nPiperOrigin-RevId: 314789978\nChange-Id: Id6aab9572a19d7031403254f39d1677971692447\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "e2139cf6e69660eed8bf42e700182ffdcf472295",
      "old_mode": 33188,
      "old_path": "quic/core/quic_framer.cc",
      "new_id": "1cba58908133eaa3e3b5f16c03e03e7c34bccfee",
      "new_mode": 33188,
      "new_path": "quic/core/quic_framer.cc"
    },
    {
      "type": "modify",
      "old_id": "fb9c2eb87bc421c6ab0b0c0156aa551530bbcc0e",
      "old_mode": 33188,
      "old_path": "quic/core/quic_framer_test.cc",
      "new_id": "a6ed3e7f5e5971d31d50601804121f535f6e70ca",
      "new_mode": 33188,
      "new_path": "quic/core/quic_framer_test.cc"
    }
  ]
}
