)]}'
{
  "commit": "24ffb5feb3312a39054178a4b0a4554fc2201248",
  "tree": "b5abd0276b987616b29b1093861cb410273bf996",
  "parents": [
    "59435533c88bd0b1254c738244da1fe96b59d05d"
  ],
  "author": {
    "name": "KB Sriram",
    "email": "kbsriram@google.com",
    "time": "Wed May 06 21:55:27 2015 -0700"
  },
  "committer": {
    "name": "Adam Langley",
    "email": "agl@golang.org",
    "time": "Fri May 08 01:16:24 2015 +0000"
  },
  "message": "x/crypto/openpgp: Limit packet recursion depth.\n\nA carefully crafted packet can cause the packet reader to push an\ninfinite number of recursive packet readers. This change limits\nthe number of recursive parsing levels within the packet reader.\n\nMore details at:\nhttp://mumble.net/~campbell/misc/pgp-quine\nhttps://web.nvd.nist.gov/view/vuln/detail?vulnId\u003dCVE-2013-4402\n\nFixes #10751\n\nChange-Id: Ib4e102d85f6496e2c7feb5b9d7e5db45db6032df\nReviewed-on: https://go-review.googlesource.com/9843\nReviewed-by: Adam Langley \u003cagl@golang.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "753bf8f6603f1f63a7aa4052439a5d13fed17f28",
      "old_mode": 33188,
      "old_path": "openpgp/packet/reader.go",
      "new_id": "34bc7c613e6e236b24b7bf97f246fceef37c8b29",
      "new_mode": 33188,
      "new_path": "openpgp/packet/reader.go"
    },
    {
      "type": "modify",
      "old_id": "c50a509a3a610c7e53c1289754cc9c1c7200a067",
      "old_mode": 33188,
      "old_path": "openpgp/read.go",
      "new_id": "dff65a8102268e678ef3e2e48f564c25aca93a50",
      "new_mode": 33188,
      "new_path": "openpgp/read.go"
    },
    {
      "type": "modify",
      "old_id": "db805f090a28df2a1a2f359c8fc81d4d885228a6",
      "old_mode": 33188,
      "old_path": "openpgp/read_test.go",
      "new_id": "03bf5d829c22f562321df485be63cd1ca8c316dd",
      "new_mode": 33188,
      "new_path": "openpgp/read_test.go"
    }
  ]
}
