X-Git-Url: https://git.openssl.org/?p=openssl.git;a=blobdiff_plain;f=CHANGES;h=d3c04a97632bfda872bf1a9a4d529191284a31e3;hp=f83fc2d555d562e09e51315a92e65b9f5f995d43;hb=5e93e5fc377ebc8bc30ffac1fa20a04cb25459eb;hpb=6025001707fd65679d758c877200469d4e72ea88 diff --git a/CHANGES b/CHANGES index f83fc2d555..d3c04a9763 100644 --- a/CHANGES +++ b/CHANGES @@ -2211,7 +2211,7 @@ *) An attacker can force an error condition which causes openssl to crash whilst processing DTLS packets due to memory being freed twice. This can be exploited through a Denial of Service attack. - Thanks to Adam Langley and Wan-The Chang for discovering and researching + Thanks to Adam Langley and Wan-Teh Chang for discovering and researching this issue. (CVE-2014-3505) [Adam Langley]