From: klemens <ka7@github.com>
Date: Fri, 5 Aug 2016 19:36:29 +0000 (+0200)
Subject: fixing too optimistic typo-fix
X-Git-Tag: OpenSSL_1_1_0~251
X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=5e93e5fc377ebc8bc30ffac1fa20a04cb25459eb;p=oweals%2Fopenssl.git

fixing too optimistic typo-fix

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/1413)
---

diff --git a/CHANGES b/CHANGES
index f83fc2d555..d3c04a9763 100644
--- a/CHANGES
+++ b/CHANGES
@@ -2211,7 +2211,7 @@
   *) An attacker can force an error condition which causes openssl to crash
      whilst processing DTLS packets due to memory being freed twice. This
      can be exploited through a Denial of Service attack.
-     Thanks to Adam Langley and Wan-The Chang for discovering and researching
+     Thanks to Adam Langley and Wan-Teh Chang for discovering and researching
      this issue.
      (CVE-2014-3505)
      [Adam Langley]