diff options
-rw-r--r-- | .codespellrc | 6 | ||||
-rw-r--r-- | sites/www/changelog.rst | 2 |
2 files changed, 2 insertions, 6 deletions
diff --git a/.codespellrc b/.codespellrc index 1ba44a9c..402b8e86 100644 --- a/.codespellrc +++ b/.codespellrc @@ -1,7 +1,3 @@ [codespell] -# skip most common present files which might be on the system skip = venvs,.venv,.git,build,*.egg-info,*.lock -# Flage and Constans are names -# uite - just truncated word in the test, cannot have -# inline annotations yet: https://github.com/codespell-project/codespell/pull/2400 -ignore-words-list = flage,constans,uite +ignore-words-list = keypair diff --git a/sites/www/changelog.rst b/sites/www/changelog.rst index ae1d7365..239c9e2c 100644 --- a/sites/www/changelog.rst +++ b/sites/www/changelog.rst @@ -334,7 +334,7 @@ Changelog This fixes a security flaw! If you are running Paramiko on 32-bit systems with low entropy (such as any 32-bit Python 2, or a 32-bit Python 3 which is running with ``PYTHONHASHSEED=0``) it is possible for an attacker to - craft a new key pair from an exfiltrated public key, which Paramiko would + craft a new keypair from an exfiltrated public key, which Paramiko would consider equal to the original key. This could enable attacks such as, but not limited to, the following: |