<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mysql-community-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:3478-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-10-25T17:33:34Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-10-25T17:33:34Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-10-25T17:33:34Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mysql-community-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

MySQL Community Server was updated to 5.6.42, fixing bugs and security issues:

Changes:
    http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-42.html

Fixed CVEs:

- CVE-2016-9843 [boo#1013882], CVE-2018-3143 [boo#1112421],
- CVE-2018-3156 [boo#1112417], CVE-2018-3251 [boo#1112397], 
- CVE-2018-3133 [boo#1112369], CVE-2018-3247 [boo#1112398],
- CVE-2018-3174 [boo#1112368], CVE-2018-3276 [boo#1112393],
- CVE-2018-3278 [boo#1112390], CVE-2018-3282 [boo#1112432],
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:3478-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-5.6.42-42.1">
      <FullProductName ProductID="libmysql56client18-5.6.42-42.1">libmysql56client18-5.6.42-42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-32bit-5.6.42-42.1">
      <FullProductName ProductID="libmysql56client18-32bit-5.6.42-42.1">libmysql56client18-32bit-5.6.42-42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-5.6.42-42.1">
      <FullProductName ProductID="libmysql56client_r18-5.6.42-42.1">libmysql56client_r18-5.6.42-42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-32bit-5.6.42-42.1">
      <FullProductName ProductID="libmysql56client_r18-32bit-5.6.42-42.1">libmysql56client_r18-32bit-5.6.42-42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-5.6.42-42.1">
      <FullProductName ProductID="mysql-community-server-5.6.42-42.1">mysql-community-server-5.6.42-42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-bench-5.6.42-42.1">
      <FullProductName ProductID="mysql-community-server-bench-5.6.42-42.1">mysql-community-server-bench-5.6.42-42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-client-5.6.42-42.1">
      <FullProductName ProductID="mysql-community-server-client-5.6.42-42.1">mysql-community-server-client-5.6.42-42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-errormessages-5.6.42-42.1">
      <FullProductName ProductID="mysql-community-server-errormessages-5.6.42-42.1">mysql-community-server-errormessages-5.6.42-42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-test-5.6.42-42.1">
      <FullProductName ProductID="mysql-community-server-test-5.6.42-42.1">mysql-community-server-test-5.6.42-42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-tools-5.6.42-42.1">
      <FullProductName ProductID="mysql-community-server-tools-5.6.42-42.1">mysql-community-server-tools-5.6.42-42.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysql56client18-5.6.42-42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client18-5.6.42-42.1">libmysql56client18-5.6.42-42.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-32bit-5.6.42-42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client18-32bit-5.6.42-42.1">libmysql56client18-32bit-5.6.42-42.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-5.6.42-42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client_r18-5.6.42-42.1">libmysql56client_r18-5.6.42-42.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-32bit-5.6.42-42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.42-42.1">libmysql56client_r18-32bit-5.6.42-42.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-5.6.42-42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-5.6.42-42.1">mysql-community-server-5.6.42-42.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-bench-5.6.42-42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-bench-5.6.42-42.1">mysql-community-server-bench-5.6.42-42.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-client-5.6.42-42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-client-5.6.42-42.1">mysql-community-server-client-5.6.42-42.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-errormessages-5.6.42-42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.42-42.1">mysql-community-server-errormessages-5.6.42-42.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-test-5.6.42-42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-test-5.6.42-42.1">mysql-community-server-test-5.6.42-42.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-tools-5.6.42-42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-tools-5.6.42-42.1">mysql-community-server-tools-5.6.42-42.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.</Note>
    </Notes>
    <CVE>CVE-2016-9843</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.42-42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9843.html</URL>
        <Description>CVE-2016-9843</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003580</URL>
        <Description>SUSE Bug 1003580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013882</URL>
        <Description>SUSE Bug 1013882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038505</URL>
        <Description>SUSE Bug 1038505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120866</URL>
        <Description>SUSE Bug 1120866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123150</URL>
        <Description>SUSE Bug 1123150</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3133</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.42-42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3133.html</URL>
        <Description>CVE-2018-3133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112369</URL>
        <Description>SUSE Bug 1112369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.42-42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3143.html</URL>
        <Description>CVE-2018-3143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112421</URL>
        <Description>SUSE Bug 1112421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.42-42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3156.html</URL>
        <Description>CVE-2018-3156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112417</URL>
        <Description>SUSE Bug 1112417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.42-42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3174.html</URL>
        <Description>CVE-2018-3174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112368</URL>
        <Description>SUSE Bug 1112368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Merge). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3247</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.42-42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3247.html</URL>
        <Description>CVE-2018-3247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112398</URL>
        <Description>SUSE Bug 1112398</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.42-42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3251.html</URL>
        <Description>CVE-2018-3251</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112397</URL>
        <Description>SUSE Bug 1112397</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3276</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.42-42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3276.html</URL>
        <Description>CVE-2018-3276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112393</URL>
        <Description>SUSE Bug 1112393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: RBR). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3278</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.42-42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3278.html</URL>
        <Description>CVE-2018-3278</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112390</URL>
        <Description>SUSE Bug 1112390</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3282</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.42-42.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.42-42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3282.html</URL>
        <Description>CVE-2018-3282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112432</URL>
        <Description>SUSE Bug 1112432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
