[Bug 1352997] Update Released

Scott Kitterman ubuntu at kitterman.com
Thu Aug 21 04:02:26 UTC 2014


The verification of the Stable Release Update for python-secretstorage
has completed successfully and the package has now been released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to python-secretstorage in Ubuntu.
https://bugs.launchpad.net/bugs/1352997

Title:
  One time of 128, session is opened incorrectly

Status in “python-secretstorage” package in Ubuntu:
  Fix Released
Status in “python-secretstorage” source package in Trusty:
  Fix Released

Bug description:
  == Impact ==
  Sometimes (one time of 128), the binary representation of common secret is 127 bytes long instead of 128, which makes the session invalid, and encrypting/decrypting produces wrong results (or crashes).

  This will lead to end-user tools (like most tools in ubuntu-dev-tools)
  to be working incorrectly.

  == Test case ==
  This can be easily reproduced by running upstream test suite (for example via autopkgtest) many times.

  == Development fix ==
  Fixed in 2.1.1, which is now in utopic

  https://github.com/mitya57/secretstorage/commit/d55efce2c04b053c

  == Regression Potential ==
  Two-lines fix, does not cause any regressions

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-secretstorage/+bug/1352997/+subscriptions



More information about the foundations-bugs mailing list