diff options
author | Dr. Stephen Henson <steve@openssl.org> | 2013-02-04 23:12:58 +0000 |
---|---|---|
committer | Dr. Stephen Henson <steve@openssl.org> | 2013-02-04 23:12:58 +0000 |
commit | 62f4033381a013c8a8edb6db5345da678495d94f (patch) | |
tree | 3ebe06fc0465417b3bcc66d5be47867c264f59b2 | |
parent | f9f6a8f96c0f2ea9a51d09ef099136d6c49f4172 (diff) | |
download | openssl-new-62f4033381a013c8a8edb6db5345da678495d94f.tar.gz |
typoOpenSSL_1_0_1d
-rw-r--r-- | CHANGES | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -19,7 +19,7 @@ *) Fix flaw in AESNI handling of TLS 1.2 and 1.1 records for CBC mode ciphersuites which can be exploited in a denial of service attack. - Thankd go to and to Adam Langley <agl@chromium.org> for discovering + Thanks go to and to Adam Langley <agl@chromium.org> for discovering and detecting this bug and to Wolfgang Ettlinger <wolfgang.ettlinger@gmail.com> for independently discovering this issue. (CVE-2012-2686) |