diff options
author | klemens <ka7@github.com> | 2016-08-05 21:36:29 +0200 |
---|---|---|
committer | Rich Salz <rsalz@openssl.org> | 2016-08-05 19:07:30 -0400 |
commit | 5e93e5fc377ebc8bc30ffac1fa20a04cb25459eb (patch) | |
tree | ff4f54f1391fb47ea02b3fbd50fc504de5245a4e | |
parent | 6025001707fd65679d758c877200469d4e72ea88 (diff) |
fixing too optimistic typo-fix
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/1413)
-rw-r--r-- | CHANGES | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -2211,7 +2211,7 @@ *) An attacker can force an error condition which causes openssl to crash whilst processing DTLS packets due to memory being freed twice. This can be exploited through a Denial of Service attack. - Thanks to Adam Langley and Wan-The Chang for discovering and researching + Thanks to Adam Langley and Wan-Teh Chang for discovering and researching this issue. (CVE-2014-3505) [Adam Langley] |