aboutsummaryrefslogtreecommitdiffstats
path: root/docs/limitations.rst
diff options
context:
space:
mode:
authorAlex Stapleton <alexs@prol.etari.at>2014-03-25 10:03:58 +0000
committerAlex Stapleton <alexs@prol.etari.at>2014-03-25 10:03:58 +0000
commita108ac6ce647112bd941657b5c7fe6a2c8ae3c36 (patch)
treed6772dc0a998f053106ff2f91f2da223afa11746 /docs/limitations.rst
parentcfe1c0b8962a268c62ae6289ee35bffe134080bd (diff)
downloadcryptography-a108ac6ce647112bd941657b5c7fe6a2c8ae3c36.tar.gz
cryptography-a108ac6ce647112bd941657b5c7fe6a2c8ae3c36.tar.bz2
cryptography-a108ac6ce647112bd941657b5c7fe6a2c8ae3c36.zip
"potentially vulnerable"
Diffstat (limited to 'docs/limitations.rst')
-rw-r--r--docs/limitations.rst4
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/limitations.rst b/docs/limitations.rst
index 7df4f810..5b63ef54 100644
--- a/docs/limitations.rst
+++ b/docs/limitations.rst
@@ -9,8 +9,8 @@ with access to uninitialized memory. This can be either because the attacker
has some kind of local user access or because of how other software uses
uninitialized memory.
-Python exposes no API for us to implement this reliably and as such most
-software in Python is vulnerable to this attack. However the
+Python exposes no API for us to implement this reliably and as such almost all
+software in Python is potentially vulnerable to this attack. However the
`CERT secure coding guidelines`_ consider this issue as "low severity,
unlikely, expensive to repair" and we do not consider this a high risk for most
users.