From: klemens <ka7@github.com> Date: Fri, 5 Aug 2016 19:36:29 +0000 (+0200) Subject: fixing too optimistic typo-fix X-Git-Tag: OpenSSL_1_1_0~251 X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=5e93e5fc377ebc8bc30ffac1fa20a04cb25459eb;p=oweals%2Fopenssl.git fixing too optimistic typo-fix Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1413) --- diff --git a/CHANGES b/CHANGES index f83fc2d555..d3c04a9763 100644 --- a/CHANGES +++ b/CHANGES @@ -2211,7 +2211,7 @@ *) An attacker can force an error condition which causes openssl to crash whilst processing DTLS packets due to memory being freed twice. This can be exploited through a Denial of Service attack. - Thanks to Adam Langley and Wan-The Chang for discovering and researching + Thanks to Adam Langley and Wan-Teh Chang for discovering and researching this issue. (CVE-2014-3505) [Adam Langley]