<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mysql-community-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1209-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-05-08T11:23:57Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-05-08T11:23:57Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-05-08T11:23:57Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mysql-community-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for mysql-community-server to version 5.6.36 fixes the following issues:

These security issues were fixed:

- CVE-2016-5483: Mysqldump failed to properly quote certain identifiers in SQL statements written to the dump output, allowing for execution of arbitrary commands (bsc#1029014)
- CVE-2017-3305: MySQL client sent authentication request unencrypted even if SSL was required (aka Ridddle) (bsc#1029396).
- CVE-2017-3308: Unspecified vulnerability in Server: DML (boo#1034850)
- CVE-2017-3309: Unspecified vulnerability in Server: Optimizer (boo#1034850)
- CVE-2017-3329: Unspecified vulnerability in Server: Thread (boo#1034850)
- CVE-2017-3453: Unspecified vulnerability in Server: Optimizer (boo#1034850)
- CVE-2017-3456: Unspecified vulnerability in Server: DML (boo#1034850)
- CVE-2017-3461: Unspecified vulnerability in Server: Security (boo#1034850)
- CVE-2017-3462: Unspecified vulnerability in Server: Security (boo#1034850)
- CVE-2017-3463: Unspecified vulnerability in Server: Security (boo#1034850)
- CVE-2017-3464: Unspecified vulnerability in Server: DDL (boo#1034850)
- CVE-2017-3302: Crash in libmysqlclient.so (bsc#1022428).
- CVE-2017-3450: Unspecified vulnerability Server: Memcached
- CVE-2017-3452: Unspecified vulnerability Server: Optimizer
- CVE-2017-3599: Unspecified vulnerability Server: Pluggable Auth
- CVE-2017-3600: Unspecified vulnerability in Client: mysqldump (boo#1034850)
- '--ssl-mode=REQUIRED' can be specified to require a secure connection (it fails if a secure connection cannot be obtained)

These non-security issues were fixed:

- Set the default umask to 077 in mysql-systemd-helper (boo#1020976)
- Change permissions of the configuration dir/files to 755/644.
  Please note that storing the password in the /etc/my.cnf file is
  not safe. Use for example an option file that is accessible only
  by yourself (boo#889126)

For more information please see http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-36.html
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:1209-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-5.6.36-24.3.3">
      <FullProductName ProductID="libmysql56client18-5.6.36-24.3.3">libmysql56client18-5.6.36-24.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-32bit-5.6.36-24.3.3">
      <FullProductName ProductID="libmysql56client18-32bit-5.6.36-24.3.3">libmysql56client18-32bit-5.6.36-24.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-5.6.36-24.3.3">
      <FullProductName ProductID="libmysql56client_r18-5.6.36-24.3.3">libmysql56client_r18-5.6.36-24.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-32bit-5.6.36-24.3.3">
      <FullProductName ProductID="libmysql56client_r18-32bit-5.6.36-24.3.3">libmysql56client_r18-32bit-5.6.36-24.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-5.6.36-24.3.3">
      <FullProductName ProductID="mysql-community-server-5.6.36-24.3.3">mysql-community-server-5.6.36-24.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-bench-5.6.36-24.3.3">
      <FullProductName ProductID="mysql-community-server-bench-5.6.36-24.3.3">mysql-community-server-bench-5.6.36-24.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-client-5.6.36-24.3.3">
      <FullProductName ProductID="mysql-community-server-client-5.6.36-24.3.3">mysql-community-server-client-5.6.36-24.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-errormessages-5.6.36-24.3.3">
      <FullProductName ProductID="mysql-community-server-errormessages-5.6.36-24.3.3">mysql-community-server-errormessages-5.6.36-24.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-test-5.6.36-24.3.3">
      <FullProductName ProductID="mysql-community-server-test-5.6.36-24.3.3">mysql-community-server-test-5.6.36-24.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-tools-5.6.36-24.3.3">
      <FullProductName ProductID="mysql-community-server-tools-5.6.36-24.3.3">mysql-community-server-tools-5.6.36-24.3.3</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysql56client18-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3">libmysql56client18-5.6.36-24.3.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-32bit-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3">libmysql56client18-32bit-5.6.36-24.3.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3">libmysql56client_r18-5.6.36-24.3.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-32bit-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3">libmysql56client_r18-32bit-5.6.36-24.3.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3">mysql-community-server-5.6.36-24.3.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-bench-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3">mysql-community-server-bench-5.6.36-24.3.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-client-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3">mysql-community-server-client-5.6.36-24.3.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-errormessages-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3">mysql-community-server-errormessages-5.6.36-24.3.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-test-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3">mysql-community-server-test-5.6.36-24.3.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-tools-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3">mysql-community-server-tools-5.6.36-24.3.3 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3">libmysql56client18-5.6.36-24.3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-32bit-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3">libmysql56client18-32bit-5.6.36-24.3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3">libmysql56client_r18-5.6.36-24.3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-32bit-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3">libmysql56client_r18-32bit-5.6.36-24.3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3">mysql-community-server-5.6.36-24.3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-bench-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3">mysql-community-server-bench-5.6.36-24.3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-client-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3">mysql-community-server-client-5.6.36-24.3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-errormessages-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3">mysql-community-server-errormessages-5.6.36-24.3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-test-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3">mysql-community-server-test-5.6.36-24.3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-tools-5.6.36-24.3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3">mysql-community-server-tools-5.6.36-24.3.3 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2017-3600.  Reason: This candidate is a reservation duplicate of CVE-2017-3600.  Notes: All CVE users should reference CVE-2017-3600 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2016-5483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5483.html</URL>
        <Description>CVE-2016-5483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001367</URL>
        <Description>SUSE Bug 1001367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005555</URL>
        <Description>SUSE Bug 1005555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005557</URL>
        <Description>SUSE Bug 1005557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005561</URL>
        <Description>SUSE Bug 1005561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005562</URL>
        <Description>SUSE Bug 1005562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005563</URL>
        <Description>SUSE Bug 1005563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005564</URL>
        <Description>SUSE Bug 1005564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005566</URL>
        <Description>SUSE Bug 1005566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005569</URL>
        <Description>SUSE Bug 1005569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005570</URL>
        <Description>SUSE Bug 1005570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005582</URL>
        <Description>SUSE Bug 1005582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020875</URL>
        <Description>SUSE Bug 1020875</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020876</URL>
        <Description>SUSE Bug 1020876</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020877</URL>
        <Description>SUSE Bug 1020877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020878</URL>
        <Description>SUSE Bug 1020878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020882</URL>
        <Description>SUSE Bug 1020882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020883</URL>
        <Description>SUSE Bug 1020883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020884</URL>
        <Description>SUSE Bug 1020884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020885</URL>
        <Description>SUSE Bug 1020885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020888</URL>
        <Description>SUSE Bug 1020888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020890</URL>
        <Description>SUSE Bug 1020890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020891</URL>
        <Description>SUSE Bug 1020891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020893</URL>
        <Description>SUSE Bug 1020893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020894</URL>
        <Description>SUSE Bug 1020894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020896</URL>
        <Description>SUSE Bug 1020896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020898</URL>
        <Description>SUSE Bug 1020898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020901</URL>
        <Description>SUSE Bug 1020901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022428</URL>
        <Description>SUSE Bug 1022428</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029014</URL>
        <Description>SUSE Bug 1029014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029396</URL>
        <Description>SUSE Bug 1029396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049393</URL>
        <Description>SUSE Bug 1049393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049394</URL>
        <Description>SUSE Bug 1049394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049396</URL>
        <Description>SUSE Bug 1049396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049399</URL>
        <Description>SUSE Bug 1049399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049400</URL>
        <Description>SUSE Bug 1049400</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049401</URL>
        <Description>SUSE Bug 1049401</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049402</URL>
        <Description>SUSE Bug 1049402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049403</URL>
        <Description>SUSE Bug 1049403</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049404</URL>
        <Description>SUSE Bug 1049404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049405</URL>
        <Description>SUSE Bug 1049405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049406</URL>
        <Description>SUSE Bug 1049406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049407</URL>
        <Description>SUSE Bug 1049407</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049408</URL>
        <Description>SUSE Bug 1049408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049409</URL>
        <Description>SUSE Bug 1049409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049410</URL>
        <Description>SUSE Bug 1049410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049411</URL>
        <Description>SUSE Bug 1049411</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049412</URL>
        <Description>SUSE Bug 1049412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049414</URL>
        <Description>SUSE Bug 1049414</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049415</URL>
        <Description>SUSE Bug 1049415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049416</URL>
        <Description>SUSE Bug 1049416</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049417</URL>
        <Description>SUSE Bug 1049417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064101</URL>
        <Description>SUSE Bug 1064101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064107</URL>
        <Description>SUSE Bug 1064107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064115</URL>
        <Description>SUSE Bug 1064115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064116</URL>
        <Description>SUSE Bug 1064116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064117</URL>
        <Description>SUSE Bug 1064117</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.</Note>
    </Notes>
    <CVE>CVE-2017-3302</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3302.html</URL>
        <Description>CVE-2017-3302</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022428</URL>
        <Description>SUSE Bug 1022428</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034911</URL>
        <Description>SUSE Bug 1034911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). Supported versions that are affected are 5.5.55 and earlier and 5.6.35 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue allows man-in-the-middle attackers to hijack the authentication of users by leveraging incorrect ordering of security parameter verification in a client, aka, "The Riddle".</Note>
    </Notes>
    <CVE>CVE-2017-3305</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3305.html</URL>
        <Description>CVE-2017-3305</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029396</URL>
        <Description>SUSE Bug 1029396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037590</URL>
        <Description>SUSE Bug 1037590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924663</URL>
        <Description>SUSE Bug 924663</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3308</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3308.html</URL>
        <Description>CVE-2017-3308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048715</URL>
        <Description>SUSE Bug 1048715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3309</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3309.html</URL>
        <Description>CVE-2017-3309</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048715</URL>
        <Description>SUSE Bug 1048715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Thread Pooling). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3329</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3329.html</URL>
        <Description>CVE-2017-3329</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048715</URL>
        <Description>SUSE Bug 1048715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3450</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3450.html</URL>
        <Description>CVE-2017-3450</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.35 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3452</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3452.html</URL>
        <Description>CVE-2017-3452</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3453</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3453.html</URL>
        <Description>CVE-2017-3453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048715</URL>
        <Description>SUSE Bug 1048715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3456.html</URL>
        <Description>CVE-2017-3456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048715</URL>
        <Description>SUSE Bug 1048715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3461</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3461.html</URL>
        <Description>CVE-2017-3461</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048715</URL>
        <Description>SUSE Bug 1048715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3462</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3462.html</URL>
        <Description>CVE-2017-3462</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048715</URL>
        <Description>SUSE Bug 1048715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3463</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3463.html</URL>
        <Description>CVE-2017-3463</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048715</URL>
        <Description>SUSE Bug 1048715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2017-3464</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3464.html</URL>
        <Description>CVE-2017-3464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048715</URL>
        <Description>SUSE Bug 1048715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue is an integer overflow in sql/auth/sql_authentication.cc which allows remote attackers to cause a denial of service via a crafted authentication packet.</Note>
    </Notes>
    <CVE>CVE-2017-3599</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3599.html</URL>
        <Description>CVE-2017-3599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-32bit-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysql56client_r18-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-bench-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-client-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-errormessages-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-test-5.6.36-24.3.3</ProductID>
        <ProductID>openSUSE Leap 42.2:mysql-community-server-tools-5.6.36-24.3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3600.html</URL>
        <Description>CVE-2017-3600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029014</URL>
        <Description>SUSE Bug 1029014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048715</URL>
        <Description>SUSE Bug 1048715</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
