Fix possible buffer overflow with PSK
diff --git a/ChangeLog b/ChangeLog
index e57b5a4..5beeb35 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -25,10 +25,11 @@
 
 Security
    * Forbid change of server certificate during renegotiation to prevent
-     "triple handshake" attack when authentication mode is optional (the
+     "triple handshake" attack when authentication mode is 'optional' (the
      attack was already impossible when authentication is required).
    * Check notBefore timestamp of certificates and CRLs from the future.
    * Forbid sequence number wrapping
+   * Fix possible buffer overflow with overlong PSK
 
 Bugfix
    * ecp_gen_keypair() does more tries to prevent failure because of