summaryrefslogtreecommitdiffstats
path: root/CHANGES
diff options
context:
space:
mode:
authorklemens <ka7@github.com>2016-08-05 21:36:29 +0200
committerRich Salz <rsalz@openssl.org>2016-08-05 19:07:30 -0400
commit5e93e5fc377ebc8bc30ffac1fa20a04cb25459eb (patch)
treeff4f54f1391fb47ea02b3fbd50fc504de5245a4e /CHANGES
parent6025001707fd65679d758c877200469d4e72ea88 (diff)
fixing too optimistic typo-fix
Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1413)
Diffstat (limited to 'CHANGES')
-rw-r--r--CHANGES2
1 files changed, 1 insertions, 1 deletions
diff --git a/CHANGES b/CHANGES
index f83fc2d555..d3c04a9763 100644
--- a/CHANGES
+++ b/CHANGES
@@ -2211,7 +2211,7 @@
*) An attacker can force an error condition which causes openssl to crash
whilst processing DTLS packets due to memory being freed twice. This
can be exploited through a Denial of Service attack.
- Thanks to Adam Langley and Wan-The Chang for discovering and researching
+ Thanks to Adam Langley and Wan-Teh Chang for discovering and researching
this issue.
(CVE-2014-3505)
[Adam Langley]