<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mysql-community-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:0223-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-01-25T19:16:40Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-01-25T19:16:40Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-01-25T19:16:40Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mysql-community-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for mysql-community-server to version 5.6.39 fixes several issues.

These security issues were fixed:

- CVE-2018-2622: Vulnerability in the subcomponent: Server: DDL. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369).
- CVE-2018-2562: Vulnerability in the subcomponent: Server : Partition. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server as well as unauthorized update,
  insert or delete access to some of MySQL Server accessible data (bsc#1076369).
- CVE-2018-2640: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369).
- CVE-2018-2665: Vulnerability in the subcomponent: Server: Optimizer).
  Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and
  5.7.20 and prior. Easily exploitable vulnerability allowed low privileged
  attacker with network access via multiple protocols to compromise MySQL Server.
  Successful attacks of this vulnerability can result in unauthorized ability to
  cause a hang or frequently repeatable crash (complete DOS) of MySQL Server
  (bsc#1076369).
- CVE-2018-2668: Vulnerability in the subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369).
- CVE-2018-2696: Vulnerability in the subcomponent: Server : Security :
  Privileges). Supported versions that are affected are 5.6.38 and prior and
  5.7.20 and prior. Easily exploitable vulnerability allowed unauthenticated
  attacker with network access via multiple protocols to compromise MySQL Server.
  Successful attacks of this vulnerability can result in unauthorized ability to
  cause a hang or frequently repeatable crash (complete DOS) of MySQL Server
  (bsc#1076369).
- CVE-2018-2583: Vulnerability in the subcomponent: Stored Procedure. Easily
  exploitable vulnerability allowed high privileged attacker with network access
  via multiple protocols to compromise MySQL Server. While the vulnerability is
  in MySQL Server, attacks may significantly impact additional products.
  Successful attacks of this vulnerability can result in unauthorized ability to
  cause a hang or frequently repeatable crash (complete DOS) of MySQL Server
  (bsc#1076369).
- CVE-2018-2612: Vulnerability in the subcomponent: InnoDB. Easily exploitable
  vulnerability allowed high privileged attacker with network access via multiple
  protocols to compromise MySQL Server. Successful attacks of this vulnerability
  can result in unauthorized creation, deletion or modification access to
  critical data or all MySQL Server accessible data and unauthorized ability to
  cause a hang or frequently repeatable crash (complete DOS) of MySQL Server
  (bsc#1076369).
- CVE-2018-2703: Vulnerability in the subcomponent: Server : Security :
  Privileges. Easily exploitable vulnerability allowed low privileged attacker
  with network access via multiple protocols to compromise MySQL Server.
  Successful attacks of this vulnerability can result in unauthorized ability to
  cause a hang or frequently repeatable crash (complete DOS) of MySQL Server
  (bsc#1076369).
- CVE-2018-2573: Vulnerability in the subcomponent: Server: GIS. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369).
- CVE-2017-3737: OpenSSL introduced an 'error state' mechanism. The intent was
  that if a fatal error occurred during a handshake then OpenSSL would move into
  the error state and would immediately fail if you attempted to continue the
  handshake. This works as designed for the explicit handshake functions
  (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it
  did not work correctly if SSL_read() or SSL_write() is called directly. In that
  scenario, if the handshake fails then a fatal error will be returned in the
  initial function call. If SSL_read()/SSL_write() is subsequently called by the
  application for the same SSL object then it will succeed and the data is passed
  without being decrypted/encrypted directly from the SSL/TLS record layer. In
  order to exploit this issue an application bug would have to be present that
  resulted in a call to SSL_read()/SSL_write() being issued after having already
  received a fatal error
- CVE-2018-2647: Vulnerability in the subcomponent: Server: Replication. Easily
  exploitable vulnerability allowed high privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server as well as unauthorized update,
  insert or delete access to some of MySQL Server accessible data (bsc#1076369).
- CVE-2018-2591: Vulnerability in the subcomponent: Server : Partition. Easily
  exploitable vulnerability allowed high privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1076369).
- CVE-2018-2590: Vulnerability in the subcomponent: Server: Performance Schema.
  Easily exploitable vulnerability allowed high privileged attacker with network
  access via multiple protocols to compromise MySQL Server. Successful attacks of
  this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS) of MySQL Server (bsc#1076369).
- CVE-2018-2645: Vulnerability in the subcomponent: Server: Performance Schema.
  Easily exploitable vulnerability allowed high privileged attacker with network
  access via multiple protocols to compromise MySQL Server. Successful attacks of
  this vulnerability can result in unauthorized access to critical data or
  complete access to all MySQL Server accessible data (bsc#1076369).

For additional details please see http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-39.html
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:0223-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-5.6.39-33.1">
      <FullProductName ProductID="libmysql56client18-5.6.39-33.1">libmysql56client18-5.6.39-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-32bit-5.6.39-33.1">
      <FullProductName ProductID="libmysql56client18-32bit-5.6.39-33.1">libmysql56client18-32bit-5.6.39-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-5.6.39-33.1">
      <FullProductName ProductID="libmysql56client_r18-5.6.39-33.1">libmysql56client_r18-5.6.39-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-32bit-5.6.39-33.1">
      <FullProductName ProductID="libmysql56client_r18-32bit-5.6.39-33.1">libmysql56client_r18-32bit-5.6.39-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-5.6.39-33.1">
      <FullProductName ProductID="mysql-community-server-5.6.39-33.1">mysql-community-server-5.6.39-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-bench-5.6.39-33.1">
      <FullProductName ProductID="mysql-community-server-bench-5.6.39-33.1">mysql-community-server-bench-5.6.39-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-client-5.6.39-33.1">
      <FullProductName ProductID="mysql-community-server-client-5.6.39-33.1">mysql-community-server-client-5.6.39-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-errormessages-5.6.39-33.1">
      <FullProductName ProductID="mysql-community-server-errormessages-5.6.39-33.1">mysql-community-server-errormessages-5.6.39-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-test-5.6.39-33.1">
      <FullProductName ProductID="mysql-community-server-test-5.6.39-33.1">mysql-community-server-test-5.6.39-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-tools-5.6.39-33.1">
      <FullProductName ProductID="mysql-community-server-tools-5.6.39-33.1">mysql-community-server-tools-5.6.39-33.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysql56client18-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1">libmysql56client18-5.6.39-33.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-32bit-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1">libmysql56client18-32bit-5.6.39-33.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1">libmysql56client_r18-5.6.39-33.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-32bit-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1">libmysql56client_r18-32bit-5.6.39-33.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1">mysql-community-server-5.6.39-33.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-bench-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1">mysql-community-server-bench-5.6.39-33.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-client-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1">mysql-community-server-client-5.6.39-33.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-errormessages-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1">mysql-community-server-errormessages-5.6.39-33.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-test-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1">mysql-community-server-test-5.6.39-33.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-tools-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1">mysql-community-server-tools-5.6.39-33.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1">libmysql56client18-5.6.39-33.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-32bit-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1">libmysql56client18-32bit-5.6.39-33.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1">libmysql56client_r18-5.6.39-33.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-32bit-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1">libmysql56client_r18-32bit-5.6.39-33.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1">mysql-community-server-5.6.39-33.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-bench-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1">mysql-community-server-bench-5.6.39-33.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-client-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1">mysql-community-server-client-5.6.39-33.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-errormessages-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1">mysql-community-server-errormessages-5.6.39-33.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-test-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1">mysql-community-server-test-5.6.39-33.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-tools-5.6.39-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1">mysql-community-server-tools-5.6.39-33.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.</Note>
    </Notes>
    <CVE>CVE-2017-3737</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3737.html</URL>
        <Description>CVE-2017-3737</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071905</URL>
        <Description>SUSE Bug 1071905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072322</URL>
        <Description>SUSE Bug 1072322</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089997</URL>
        <Description>SUSE Bug 1089997</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2562</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2562.html</URL>
        <Description>CVE-2018-2562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078431</URL>
        <Description>SUSE Bug 1078431</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: GIS). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2573</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2573.html</URL>
        <Description>CVE-2018-2573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Stored Procedure). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.8 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2583</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2583.html</URL>
        <Description>CVE-2018-2583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2590</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2590.html</URL>
        <Description>CVE-2018-2590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2591</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2591.html</URL>
        <Description>CVE-2018-2591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2612</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2612.html</URL>
        <Description>CVE-2018-2612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078431</URL>
        <Description>SUSE Bug 1078431</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2622.html</URL>
        <Description>CVE-2018-2622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078431</URL>
        <Description>SUSE Bug 1078431</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2640.html</URL>
        <Description>CVE-2018-2640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078431</URL>
        <Description>SUSE Bug 1078431</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2645</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2645.html</URL>
        <Description>CVE-2018-2645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2647.html</URL>
        <Description>CVE-2018-2647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2665.html</URL>
        <Description>CVE-2018-2665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078431</URL>
        <Description>SUSE Bug 1078431</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2668.html</URL>
        <Description>CVE-2018-2668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078431</URL>
        <Description>SUSE Bug 1078431</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2696.html</URL>
        <Description>CVE-2018-2696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2703</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.39-33.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.39-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2703.html</URL>
        <Description>CVE-2018-2703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
