diff options
author | Alex Stapleton <alexs@prol.etari.at> | 2014-03-25 10:03:58 +0000 |
---|---|---|
committer | Alex Stapleton <alexs@prol.etari.at> | 2014-03-25 10:03:58 +0000 |
commit | a108ac6ce647112bd941657b5c7fe6a2c8ae3c36 (patch) | |
tree | d6772dc0a998f053106ff2f91f2da223afa11746 /docs | |
parent | cfe1c0b8962a268c62ae6289ee35bffe134080bd (diff) | |
download | cryptography-a108ac6ce647112bd941657b5c7fe6a2c8ae3c36.tar.gz cryptography-a108ac6ce647112bd941657b5c7fe6a2c8ae3c36.tar.bz2 cryptography-a108ac6ce647112bd941657b5c7fe6a2c8ae3c36.zip |
"potentially vulnerable"
Diffstat (limited to 'docs')
-rw-r--r-- | docs/limitations.rst | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/limitations.rst b/docs/limitations.rst index 7df4f810..5b63ef54 100644 --- a/docs/limitations.rst +++ b/docs/limitations.rst @@ -9,8 +9,8 @@ with access to uninitialized memory. This can be either because the attacker has some kind of local user access or because of how other software uses uninitialized memory. -Python exposes no API for us to implement this reliably and as such most -software in Python is vulnerable to this attack. However the +Python exposes no API for us to implement this reliably and as such almost all +software in Python is potentially vulnerable to this attack. However the `CERT secure coding guidelines`_ consider this issue as "low severity, unlikely, expensive to repair" and we do not consider this a high risk for most users. |