From a108ac6ce647112bd941657b5c7fe6a2c8ae3c36 Mon Sep 17 00:00:00 2001 From: Alex Stapleton Date: Tue, 25 Mar 2014 10:03:58 +0000 Subject: "potentially vulnerable" --- docs/limitations.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'docs') diff --git a/docs/limitations.rst b/docs/limitations.rst index 7df4f810..5b63ef54 100644 --- a/docs/limitations.rst +++ b/docs/limitations.rst @@ -9,8 +9,8 @@ with access to uninitialized memory. This can be either because the attacker has some kind of local user access or because of how other software uses uninitialized memory. -Python exposes no API for us to implement this reliably and as such most -software in Python is vulnerable to this attack. However the +Python exposes no API for us to implement this reliably and as such almost all +software in Python is potentially vulnerable to this attack. However the `CERT secure coding guidelines`_ consider this issue as "low severity, unlikely, expensive to repair" and we do not consider this a high risk for most users. -- cgit v1.2.3