<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mysql-community-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:2293-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-08-09T20:44:38Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-08-09T20:44:38Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-08-09T20:44:38Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mysql-community-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for mysql-community-server to version 5.6.41 fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-3064: Fixed an easily exploitable vulnerability that allowed a low
  privileged attacker with network access via multiple protocols to compromise
  the MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server as well as unauthorized update, insert or
  delete access to some of MySQL Server accessible data. (bsc#1103342)

- CVE-2018-3070: Fixed an easily exploitable vulnerability that allowed a low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1101679)

- CVE-2018-0739: Fixed a stack exhaustion in case of recursively constructed
  ASN.1 types. (boo#1087102)

- CVE-2018-3062: Fixed a difficult to exploit vulnerability that allowed
  low privileged attacker with network access via memcached to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Server. (bsc#1103344)

- CVE-2018-3081: Fixed a difficult to exploit vulnerability that allowed
  high privileged attacker with network access via multiple protocols to
  compromise MySQL Client. Successful attacks of this vulnerability can result
  in unauthorized ability to cause a hang or frequently repeatable crash
  (complete DOS) of MySQL Client as well as unauthorized update, insert or
  delete access to some of MySQL Client accessible data. (bsc#1101680)

- CVE-2018-3058: Fixed an easily exploitable vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data. (bsc#1101676)

- CVE-2018-3066: Fixed a difficult to exploit vulnerability allowed high
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized update, insert or delete access to some of MySQL Server
  accessible data as well as unauthorized read access to a subset of MySQL
  Server accessible data. (bsc#1101678)

- CVE-2018-2767: Fixed a difficult to exploit vulnerability that allowed low
  privileged attacker with network access via multiple protocols to compromise
  MySQL Server. Successful attacks of this vulnerability can result in
  unauthorized read access to a subset of MySQL Server accessible data.
  (boo#1088681)

You can find more detailed information about this update in the
[release notes](http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-41.html)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:2293-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-5.6.41-39.1">
      <FullProductName ProductID="libmysql56client18-5.6.41-39.1">libmysql56client18-5.6.41-39.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-32bit-5.6.41-39.1">
      <FullProductName ProductID="libmysql56client18-32bit-5.6.41-39.1">libmysql56client18-32bit-5.6.41-39.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-5.6.41-39.1">
      <FullProductName ProductID="libmysql56client_r18-5.6.41-39.1">libmysql56client_r18-5.6.41-39.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-32bit-5.6.41-39.1">
      <FullProductName ProductID="libmysql56client_r18-32bit-5.6.41-39.1">libmysql56client_r18-32bit-5.6.41-39.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-5.6.41-39.1">
      <FullProductName ProductID="mysql-community-server-5.6.41-39.1">mysql-community-server-5.6.41-39.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-bench-5.6.41-39.1">
      <FullProductName ProductID="mysql-community-server-bench-5.6.41-39.1">mysql-community-server-bench-5.6.41-39.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-client-5.6.41-39.1">
      <FullProductName ProductID="mysql-community-server-client-5.6.41-39.1">mysql-community-server-client-5.6.41-39.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-errormessages-5.6.41-39.1">
      <FullProductName ProductID="mysql-community-server-errormessages-5.6.41-39.1">mysql-community-server-errormessages-5.6.41-39.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-test-5.6.41-39.1">
      <FullProductName ProductID="mysql-community-server-test-5.6.41-39.1">mysql-community-server-test-5.6.41-39.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-tools-5.6.41-39.1">
      <FullProductName ProductID="mysql-community-server-tools-5.6.41-39.1">mysql-community-server-tools-5.6.41-39.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysql56client18-5.6.41-39.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client18-5.6.41-39.1">libmysql56client18-5.6.41-39.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-32bit-5.6.41-39.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client18-32bit-5.6.41-39.1">libmysql56client18-32bit-5.6.41-39.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-5.6.41-39.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client_r18-5.6.41-39.1">libmysql56client_r18-5.6.41-39.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-32bit-5.6.41-39.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.41-39.1">libmysql56client_r18-32bit-5.6.41-39.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-5.6.41-39.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-5.6.41-39.1">mysql-community-server-5.6.41-39.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-bench-5.6.41-39.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-bench-5.6.41-39.1">mysql-community-server-bench-5.6.41-39.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-client-5.6.41-39.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-client-5.6.41-39.1">mysql-community-server-client-5.6.41-39.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-errormessages-5.6.41-39.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.41-39.1">mysql-community-server-errormessages-5.6.41-39.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-test-5.6.41-39.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-test-5.6.41-39.1">mysql-community-server-test-5.6.41-39.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-tools-5.6.41-39.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-tools-5.6.41-39.1">mysql-community-server-tools-5.6.41-39.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).</Note>
    </Notes>
    <CVE>CVE-2018-0739</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.41-39.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0739.html</URL>
        <Description>CVE-2018-0739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087102</URL>
        <Description>SUSE Bug 1087102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089997</URL>
        <Description>SUSE Bug 1089997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108542</URL>
        <Description>SUSE Bug 1108542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.41-39.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2767.html</URL>
        <Description>CVE-2018-2767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088681</URL>
        <Description>SUSE Bug 1088681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101675</URL>
        <Description>SUSE Bug 1101675</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-3058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.41-39.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3058.html</URL>
        <Description>CVE-2018-3058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101676</URL>
        <Description>SUSE Bug 1101676</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via memcached to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3062</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.41-39.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3062.html</URL>
        <Description>CVE-2018-3062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103344</URL>
        <Description>SUSE Bug 1103344</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3064</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.41-39.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3064.html</URL>
        <Description>CVE-2018-3064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103342</URL>
        <Description>SUSE Bug 1103342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-3066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.41-39.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3066.html</URL>
        <Description>CVE-2018-3066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101678</URL>
        <Description>SUSE Bug 1101678</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3070</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.41-39.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3070.html</URL>
        <Description>CVE-2018-3070</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101679</URL>
        <Description>SUSE Bug 1101679</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.0 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3081</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.41-39.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.41-39.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3081.html</URL>
        <Description>CVE-2018-3081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101680</URL>
        <Description>SUSE Bug 1101680</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
