diff options
author | Alex Stapleton <alexs@prol.etari.at> | 2014-03-24 11:21:08 +0000 |
---|---|---|
committer | Alex Stapleton <alexs@prol.etari.at> | 2014-03-24 11:21:08 +0000 |
commit | cfe1c0b8962a268c62ae6289ee35bffe134080bd (patch) | |
tree | a2aaa704f45f9c38cff5d95699cde6e4cb205f99 /docs/limitations.rst | |
parent | da4e0fa7a3dd53d3b81b655d0a3c0078063ab320 (diff) | |
download | cryptography-cfe1c0b8962a268c62ae6289ee35bffe134080bd.tar.gz cryptography-cfe1c0b8962a268c62ae6289ee35bffe134080bd.tar.bz2 cryptography-cfe1c0b8962a268c62ae6289ee35bffe134080bd.zip |
Rephrase to avoid american english failure
Diffstat (limited to 'docs/limitations.rst')
-rw-r--r-- | docs/limitations.rst | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/limitations.rst b/docs/limitations.rst index 3028e7c8..7df4f810 100644 --- a/docs/limitations.rst +++ b/docs/limitations.rst @@ -11,7 +11,7 @@ uninitialized memory. Python exposes no API for us to implement this reliably and as such most software in Python is vulnerable to this attack. However the -`CERT secure coding guidelines`_ categorise this issue as "low severity, +`CERT secure coding guidelines`_ consider this issue as "low severity, unlikely, expensive to repair" and we do not consider this a high risk for most users. |