trusty openssl upgrade causes connections to fail
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Percona XtraDB Cluster moved to https://jira.percona.com/projects/PXC |
New
|
Undecided
|
Unassigned |
Bug Description
Hi,
After applying today's libssl/openssl upgrades:
Setting up libssl1.0.0:amd64 (1.0.1f-
Setting up openssl (1.0.1f-
I can't connect to the database:
jolan@testdbe0:~$ mysql -uroot -pxxx
Warning: Using a password on the command line interface can be insecure.
ERROR 2026 (HY000): SSL connection error: error:00000001:
Not sure if ubuntu messed up ABI compatibility or what.
Reverting to libssl1.
I'm using the latest cluster package on trusty:
dpkg -s percona-
Package: percona-
Status: install ok installed
Priority: extra
Section: database
Installed-Size: 57
Maintainer: Percona Server Development Team <email address hidden>
Architecture: amd64
Source: percona-
Version: 5.6.24-
Depends: percona-
Description: Percona XtraDB Cluster with Galera
This is a meta-package providing PXC56 server, client and galera-3.
Homepage: http://
I didn't see anything in the changelog that would explain this:
Get:1 Changelog for libssl1.0.0 (http:// changelogs. ubuntu. com/changelogs/ pool/main/ o/openssl/ openssl_ 1.0.1f- 1ubuntu2. 15/changelog) [131 kB] 1ubuntu2. 15) trusty-security; urgency=medium
openssl (1.0.1f-
* SECURITY IMPROVEMENT: reject dh keys smaller than 768 bits patches/ reject_ small_dh. patch: reject small dh keys in s3_clnt. c, ssl/ssl.h, ssl/ssl_err.c, update documentation in ssl/SSL_ CTX_set_ tmp_dh_ callback. pod, make s_server use 2048-bit dhparam. pod. patches/ CVE-2014- 8176.patch: fix invalid free in ssl/d1_lib.c. patches/ CVE-2015- 1788.patch: improve logic in bn/bn_gf2m. c. patches/ CVE-2015- 1789.patch: properly parse time format in x509/x509_ vfy.c. patches/ CVE-2015- 1790.patch: handle NULL data_body in pkcs7/pk7_ doit.c. patches/ CVE-2015- 1791.patch: create a new session in s3_clnt. c, ssl/ssl.h, ssl/ssl_err.c, ssl/ssl_locl.h, ssl_sess. c. patches/ CVE-2015- 1791-2. patch: fix kerberos issue in ssl_sess. c. patches/ CVE-2015- 1791-3. patch: more ssl_session_dup fixes in ssl_sess. c. patches/ CVE-2015- 1792.patch: fix infinite loop in cms/cms_ smime.c.
- debian/
ssl/
doc/
dh in apps/s_server.c, clarify docs in doc/apps/
* SECURITY UPDATE: denial of service and possible code execution via
invalid free in DTLS
- debian/
- CVE-2014-8176
* SECURITY UPDATE: denial of service via malformed ECParameters
- debian/
crypto/
- CVE-2015-1788
* SECURITY UPDATE: denial of service via out-of-bounds read in
X509_cmp_time
- debian/
crypto/
- CVE-2015-1789
* SECURITY UPDATE: denial of service via missing EnvelopedContent
- debian/
crypto/
- CVE-2015-1790
* SECURITY UPDATE: race condition in NewSessionTicket
- debian/
ssl/
ssl/
- debian/
ssl/
- debian/
ssl/
- CVE-2015-1791
* SECURITY UPDATE: CMS verify infinite loop with unknown hash function
- debian/
crypto/
- CVE-2015-1792
-- Marc Deslauriers <email address hidden> Thu, 11 Jun 2015 07:34:23 -0400