trusty openssl upgrade causes connections to fail

Bug #1464683 reported by jolan
14
This bug affects 3 people
Affects Status Importance Assigned to Milestone
Percona XtraDB Cluster moved to https://jira.percona.com/projects/PXC
New
Undecided
Unassigned

Bug Description

Hi,

After applying today's libssl/openssl upgrades:

Setting up libssl1.0.0:amd64 (1.0.1f-1ubuntu2.15) ...
Setting up openssl (1.0.1f-1ubuntu2.15) ...

I can't connect to the database:

jolan@testdbe0:~$ mysql -uroot -pxxx
Warning: Using a password on the command line interface can be insecure.
ERROR 2026 (HY000): SSL connection error: error:00000001:lib(0):func(0):reason(1)

Not sure if ubuntu messed up ABI compatibility or what.

Reverting to libssl1.0.0_1.0.1f-1ubuntu2.12_amd64.deb openssl_1.0.1f-1ubuntu2.12_amd64.deb fixed it.

I'm using the latest cluster package on trusty:

dpkg -s percona-xtradb-cluster-56
Package: percona-xtradb-cluster-56
Status: install ok installed
Priority: extra
Section: database
Installed-Size: 57
Maintainer: Percona Server Development Team <email address hidden>
Architecture: amd64
Source: percona-xtradb-cluster-5.6
Version: 5.6.24-25.11-1.trusty
Depends: percona-xtradb-cluster-server-5.6 (>= 5.6.24-25.11-1.trusty), percona-xtradb-cluster-client-5.6 (>= 5.6.24-25.11-1.trusty), percona-xtradb-cluster-galera-3
Description: Percona XtraDB Cluster with Galera
 This is a meta-package providing PXC56 server, client and galera-3.
Homepage: http://www.percona.com/software/percona-xtradb-cluster/

Revision history for this message
jolan (jolan) wrote :

I didn't see anything in the changelog that would explain this:

Get:1 Changelog for libssl1.0.0 (http://changelogs.ubuntu.com/changelogs/pool/main/o/openssl/openssl_1.0.1f-1ubuntu2.15/changelog) [131 kB]
openssl (1.0.1f-1ubuntu2.15) trusty-security; urgency=medium

  * SECURITY IMPROVEMENT: reject dh keys smaller than 768 bits
    - debian/patches/reject_small_dh.patch: reject small dh keys in
      ssl/s3_clnt.c, ssl/ssl.h, ssl/ssl_err.c, update documentation in
      doc/ssl/SSL_CTX_set_tmp_dh_callback.pod, make s_server use 2048-bit
      dh in apps/s_server.c, clarify docs in doc/apps/dhparam.pod.
  * SECURITY UPDATE: denial of service and possible code execution via
    invalid free in DTLS
    - debian/patches/CVE-2014-8176.patch: fix invalid free in ssl/d1_lib.c.
    - CVE-2014-8176
  * SECURITY UPDATE: denial of service via malformed ECParameters
    - debian/patches/CVE-2015-1788.patch: improve logic in
      crypto/bn/bn_gf2m.c.
    - CVE-2015-1788
  * SECURITY UPDATE: denial of service via out-of-bounds read in
    X509_cmp_time
    - debian/patches/CVE-2015-1789.patch: properly parse time format in
      crypto/x509/x509_vfy.c.
    - CVE-2015-1789
  * SECURITY UPDATE: denial of service via missing EnvelopedContent
    - debian/patches/CVE-2015-1790.patch: handle NULL data_body in
      crypto/pkcs7/pk7_doit.c.
    - CVE-2015-1790
  * SECURITY UPDATE: race condition in NewSessionTicket
    - debian/patches/CVE-2015-1791.patch: create a new session in
      ssl/s3_clnt.c, ssl/ssl.h, ssl/ssl_err.c, ssl/ssl_locl.h,
      ssl/ssl_sess.c.
    - debian/patches/CVE-2015-1791-2.patch: fix kerberos issue in
      ssl/ssl_sess.c.
    - debian/patches/CVE-2015-1791-3.patch: more ssl_session_dup fixes in
      ssl/ssl_sess.c.
    - CVE-2015-1791
  * SECURITY UPDATE: CMS verify infinite loop with unknown hash function
    - debian/patches/CVE-2015-1792.patch: fix infinite loop in
      crypto/cms/cms_smime.c.
    - CVE-2015-1792

 -- Marc Deslauriers <email address hidden> Thu, 11 Jun 2015 07:34:23 -0400

Revision history for this message
Teodor Milkov (tm-del) wrote :

Same here on Debian 7 (Wheezy):

mysql -u smith -h db.example.com -p --ssl-ca=/etc/ssl/certs/StartCom_Certification_Authority.pem
ERROR 2026 (HY000): SSL connection error: error:00000001:lib(0):func(0):reason(1)

Workaround:

mysql -u smith -h db.example.com -p --ssl-ca=/etc/ssl/certs/StartCom_Certification_Authority.pem --ssl-cipher=AES128-SHA
...
\s
SSL: Cipher in use is AES128-SHA

Revision history for this message
Teodor Milkov (tm-del) wrote :

Maybe this (openssl update breaks mysql DHE): https://bugs.launchpad.net/percona-server/+bug/1462856

Revision history for this message
Clay (games-junk-stuff) wrote :

Verified that this is a DHE difference.

https://bugs.mysql.com/bug.php?id=77275

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.