Improve the changelog entry for fixing legacy compression issue

Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
diff --git a/ChangeLog.d/fix-legacy-compression-issue.txt b/ChangeLog.d/fix-legacy-compression-issue.txt
index e51ee24..8b2fe23 100644
--- a/ChangeLog.d/fix-legacy-compression-issue.txt
+++ b/ChangeLog.d/fix-legacy-compression-issue.txt
@@ -1,7 +1,7 @@
 Bugfix
-   * Fix an issue where ssl_tls13_parse_client_hello() assumed legacy_compression_methods
-     length would always be zero, which is true for TLS 1.3. However, with TLS 1.3 enabled
-     by default, all ClientHello requests (including TLS 1.2 requests) are initially
-     processed by ssl_tls13_parse_client_hello() before being passed to the TLS 1.2
-     parsing function. This caused an issue where legacy_compression_methods
-     might not be zero for TLS 1.2 requests, as it is processed earlier.
+   * Fix an issue where TLS 1.2 clients who send a ClientHello message with
+     legacy_compression_methods get a failure in connection because TLS 1.3
+     is enabled by default and the server rejects the ClientHello packet as
+     malformed for TLS 1.3 in a way that stops the fallback to TLS 1.2.
+     fixes #8995, #9243.
+