<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mysql-community-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:2011-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-07-29T09:53:29Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-07-29T09:53:29Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-07-29T09:53:29Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mysql-community-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for mysql-community-server to version 5.6.37 fixes security issues and bugs.

The following vulnerabilities were fixed:
- CVE-2017-3633: Memcached unspecified vulnerability (boo#1049394) 
- CVE-2017-3634: DML unspecified vulnerability (boo#1049396) 
- CVE-2017-3635: C API unspecified vulnerability (boo#1049398) 
- CVE-2017-3636: Client programs unspecified vulnerability (boo#1049399) 
- CVE-2017-3641: DML unspecified vulnerability (boo#1049404) 
- CVE-2017-3647: Replication unspecified vulnerability (boo#1049410) 
- CVE-2017-3648: Charsets unspecified vulnerability (boo#1049411) 
- CVE-2017-3649: Replication unspecified vulnerability (boo#1049412) 
- CVE-2017-3651: Client mysqldump unspecified vulnerability (boo#1049415) 
- CVE-2017-3652: DDL unspecified vulnerability (boo#1049416) 
- CVE-2017-3653: DDL unspecified vulnerability (boo#1049417) 
- CVE-2017-3732: Security, Encryption unspecified vulnerability (boo#1049421) 
 
The following general changes are included:

- switch systemd unit file from 'Restart=on-failure' to 'Restart=on-abort'
- update file lists for new man-pages and tools (for mariadb) 

For a list of upstream changes in this release, see:
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-37.html
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:2011-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-5.6.37-27.1">
      <FullProductName ProductID="libmysql56client18-5.6.37-27.1">libmysql56client18-5.6.37-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-32bit-5.6.37-27.1">
      <FullProductName ProductID="libmysql56client18-32bit-5.6.37-27.1">libmysql56client18-32bit-5.6.37-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-5.6.37-27.1">
      <FullProductName ProductID="libmysql56client_r18-5.6.37-27.1">libmysql56client_r18-5.6.37-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-32bit-5.6.37-27.1">
      <FullProductName ProductID="libmysql56client_r18-32bit-5.6.37-27.1">libmysql56client_r18-32bit-5.6.37-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-5.6.37-27.1">
      <FullProductName ProductID="mysql-community-server-5.6.37-27.1">mysql-community-server-5.6.37-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-bench-5.6.37-27.1">
      <FullProductName ProductID="mysql-community-server-bench-5.6.37-27.1">mysql-community-server-bench-5.6.37-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-client-5.6.37-27.1">
      <FullProductName ProductID="mysql-community-server-client-5.6.37-27.1">mysql-community-server-client-5.6.37-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-errormessages-5.6.37-27.1">
      <FullProductName ProductID="mysql-community-server-errormessages-5.6.37-27.1">mysql-community-server-errormessages-5.6.37-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-test-5.6.37-27.1">
      <FullProductName ProductID="mysql-community-server-test-5.6.37-27.1">mysql-community-server-test-5.6.37-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-tools-5.6.37-27.1">
      <FullProductName ProductID="mysql-community-server-tools-5.6.37-27.1">mysql-community-server-tools-5.6.37-27.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysql56client18-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1">libmysql56client18-5.6.37-27.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-32bit-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1">libmysql56client18-32bit-5.6.37-27.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1">libmysql56client_r18-5.6.37-27.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-32bit-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1">libmysql56client_r18-32bit-5.6.37-27.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1">mysql-community-server-5.6.37-27.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-bench-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1">mysql-community-server-bench-5.6.37-27.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-client-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1">mysql-community-server-client-5.6.37-27.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-errormessages-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1">mysql-community-server-errormessages-5.6.37-27.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-test-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1">mysql-community-server-test-5.6.37-27.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-tools-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1">mysql-community-server-tools-5.6.37-27.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1">libmysql56client18-5.6.37-27.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-32bit-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1">libmysql56client18-32bit-5.6.37-27.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1">libmysql56client_r18-5.6.37-27.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-32bit-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1">libmysql56client_r18-32bit-5.6.37-27.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1">mysql-community-server-5.6.37-27.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-bench-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1">mysql-community-server-bench-5.6.37-27.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-client-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1">mysql-community-server-client-5.6.37-27.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-errormessages-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1">mysql-community-server-errormessages-5.6.37-27.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-test-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1">mysql-community-server-test-5.6.37-27.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-tools-5.6.37-27.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1">mysql-community-server-tools-5.6.37-27.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Memcached to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3633</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3633.html</URL>
        <Description>CVE-2017-3633</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049394</URL>
        <Description>SUSE Bug 1049394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3634</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3634.html</URL>
        <Description>CVE-2017-3634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049396</URL>
        <Description>SUSE Bug 1049396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/C). Supported versions that are affected are 6.1.10 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. Note: The documentation has also been updated for the correct way to use mysql_stmt_close(). Please see: https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-execute.html,  https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-fetch.html, https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-close.html, https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-error.html, https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-errno.html, and  https://dev.mysql.com/doc/refman/5.7/en/mysql-stmt-sqlstate.html. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3635</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3635.html</URL>
        <Description>CVE-2017-3635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049397</URL>
        <Description>SUSE Bug 1049397</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049398</URL>
        <Description>SUSE Bug 1049398</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-3636</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3636.html</URL>
        <Description>CVE-2017-3636</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049399</URL>
        <Description>SUSE Bug 1049399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054591</URL>
        <Description>SUSE Bug 1054591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076506</URL>
        <Description>SUSE Bug 1076506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3641.html</URL>
        <Description>CVE-2017-3641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049404</URL>
        <Description>SUSE Bug 1049404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054591</URL>
        <Description>SUSE Bug 1054591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076506</URL>
        <Description>SUSE Bug 1076506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3647.html</URL>
        <Description>CVE-2017-3647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049410</URL>
        <Description>SUSE Bug 1049410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3648</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3648.html</URL>
        <Description>CVE-2017-3648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049411</URL>
        <Description>SUSE Bug 1049411</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3649</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3649.html</URL>
        <Description>CVE-2017-3649</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049412</URL>
        <Description>SUSE Bug 1049412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-3651</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3651.html</URL>
        <Description>CVE-2017-3651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049415</URL>
        <Description>SUSE Bug 1049415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-3652</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3652.html</URL>
        <Description>CVE-2017-3652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049416</URL>
        <Description>SUSE Bug 1049416</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-3653</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3653.html</URL>
        <Description>CVE-2017-3653</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049417</URL>
        <Description>SUSE Bug 1049417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054591</URL>
        <Description>SUSE Bug 1054591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076506</URL>
        <Description>SUSE Bug 1076506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.</Note>
    </Notes>
    <CVE>CVE-2017-3732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.37-27.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.37-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3732.html</URL>
        <Description>CVE-2017-3732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021641</URL>
        <Description>SUSE Bug 1021641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022086</URL>
        <Description>SUSE Bug 1022086</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1025354</URL>
        <Description>SUSE Bug 1025354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049418</URL>
        <Description>SUSE Bug 1049418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049421</URL>
        <Description>SUSE Bug 1049421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066242</URL>
        <Description>SUSE Bug 1066242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071906</URL>
        <Description>SUSE Bug 1071906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957814</URL>
        <Description>SUSE Bug 957814</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
