)]}'
{
  "commit": "c8df898204584e92b9e5001847788d899b34353d",
  "tree": "04c74921edebc1b921d990db19f228f6023aa2e3",
  "parents": [
    "12c5aaae574114cf4883d0e21aa0045b0a606110"
  ],
  "author": {
    "name": "Gilles Peskine",
    "email": "Gilles.Peskine@arm.com",
    "time": "Mon Oct 02 14:58:16 2023 +0200"
  },
  "committer": {
    "name": "Gilles Peskine",
    "email": "Gilles.Peskine@arm.com",
    "time": "Mon Oct 02 15:02:33 2023 +0200"
  },
  "message": "Fix buffer overflow in TLS 1.2 ClientKeyExchange parsing\n\nFix a buffer overflow in TLS 1.2 ClientKeyExchange parsing. When\nMBEDTLS_USE_PSA_CRYPTO is enabled, the length of the public key in an ECDH\nor ECDHE key exchange was not validated. This could result in an overflow of\nhandshake-\u003exxdh_psa_peerkey, overwriting further data in the handshake\nstructure or further on the heap.\n\nSigned-off-by: Gilles Peskine \u003cGilles.Peskine@arm.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "d2143ac15046c9c7239999cc0b9cdf413a2db912",
      "old_mode": 33188,
      "old_path": "library/ssl_tls12_server.c",
      "new_id": "ed2fbd1d6f2f89724810439dff515d517da2a0d4",
      "new_mode": 33188,
      "new_path": "library/ssl_tls12_server.c"
    }
  ]
}
