From 19e5db81ec13ef3aeeb8c12f94d096376d8d8f4c Mon Sep 17 00:00:00 2001 From: Jeff Forcier Date: Fri, 27 Jan 2023 17:18:06 -0500 Subject: Tidy up codespellrc, revert s/keypair/key pair/ --- sites/www/changelog.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'sites') diff --git a/sites/www/changelog.rst b/sites/www/changelog.rst index ae1d7365..239c9e2c 100644 --- a/sites/www/changelog.rst +++ b/sites/www/changelog.rst @@ -334,7 +334,7 @@ Changelog This fixes a security flaw! If you are running Paramiko on 32-bit systems with low entropy (such as any 32-bit Python 2, or a 32-bit Python 3 which is running with ``PYTHONHASHSEED=0``) it is possible for an attacker to - craft a new key pair from an exfiltrated public key, which Paramiko would + craft a new keypair from an exfiltrated public key, which Paramiko would consider equal to the original key. This could enable attacks such as, but not limited to, the following: -- cgit v1.2.1