<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mysql-community-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:0138-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-02-05T09:16:15Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-02-05T09:16:15Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-02-05T09:16:15Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mysql-community-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for mysql-community-server to version 5.6.43 fixes the following issues:

Security issues fixed:

- CVE-2019-2534, CVE-2019-2529, CVE-2019-2482, 
  CVE-2019-2455, CVE-2019-2503, CVE-2019-2537, 
  CVE-2019-2481, CVE-2019-2507, CVE-2019-2531, 
  CVE-2018-0734  (boo#1113652, boo#1122198)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:0138-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-5.6.43-45.1">
      <FullProductName ProductID="libmysql56client18-5.6.43-45.1">libmysql56client18-5.6.43-45.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-32bit-5.6.43-45.1">
      <FullProductName ProductID="libmysql56client18-32bit-5.6.43-45.1">libmysql56client18-32bit-5.6.43-45.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-5.6.43-45.1">
      <FullProductName ProductID="libmysql56client_r18-5.6.43-45.1">libmysql56client_r18-5.6.43-45.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-32bit-5.6.43-45.1">
      <FullProductName ProductID="libmysql56client_r18-32bit-5.6.43-45.1">libmysql56client_r18-32bit-5.6.43-45.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-5.6.43-45.1">
      <FullProductName ProductID="mysql-community-server-5.6.43-45.1">mysql-community-server-5.6.43-45.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-bench-5.6.43-45.1">
      <FullProductName ProductID="mysql-community-server-bench-5.6.43-45.1">mysql-community-server-bench-5.6.43-45.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-client-5.6.43-45.1">
      <FullProductName ProductID="mysql-community-server-client-5.6.43-45.1">mysql-community-server-client-5.6.43-45.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-errormessages-5.6.43-45.1">
      <FullProductName ProductID="mysql-community-server-errormessages-5.6.43-45.1">mysql-community-server-errormessages-5.6.43-45.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-test-5.6.43-45.1">
      <FullProductName ProductID="mysql-community-server-test-5.6.43-45.1">mysql-community-server-test-5.6.43-45.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-tools-5.6.43-45.1">
      <FullProductName ProductID="mysql-community-server-tools-5.6.43-45.1">mysql-community-server-tools-5.6.43-45.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysql56client18-5.6.43-45.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client18-5.6.43-45.1">libmysql56client18-5.6.43-45.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-32bit-5.6.43-45.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client18-32bit-5.6.43-45.1">libmysql56client18-32bit-5.6.43-45.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-5.6.43-45.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client_r18-5.6.43-45.1">libmysql56client_r18-5.6.43-45.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-32bit-5.6.43-45.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.43-45.1">libmysql56client_r18-32bit-5.6.43-45.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-5.6.43-45.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-5.6.43-45.1">mysql-community-server-5.6.43-45.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-bench-5.6.43-45.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-bench-5.6.43-45.1">mysql-community-server-bench-5.6.43-45.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-client-5.6.43-45.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-client-5.6.43-45.1">mysql-community-server-client-5.6.43-45.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-errormessages-5.6.43-45.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.43-45.1">mysql-community-server-errormessages-5.6.43-45.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-test-5.6.43-45.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-test-5.6.43-45.1">mysql-community-server-test-5.6.43-45.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-tools-5.6.43-45.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:mysql-community-server-tools-5.6.43-45.1">mysql-community-server-tools-5.6.43-45.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).</Note>
    </Notes>
    <CVE>CVE-2018-0734</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.43-45.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0734.html</URL>
        <Description>CVE-2018-0734</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113534</URL>
        <Description>SUSE Bug 1113534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113652</URL>
        <Description>SUSE Bug 1113652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113742</URL>
        <Description>SUSE Bug 1113742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122212</URL>
        <Description>SUSE Bug 1122212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2455</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.43-45.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2455.html</URL>
        <Description>CVE-2019-2455</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2481</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.43-45.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2481.html</URL>
        <Description>CVE-2019-2481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: PS). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2482</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.43-45.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2482.html</URL>
        <Description>CVE-2019-2482</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection Handling). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Difficult to exploit vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.4 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2503</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.43-45.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2503.html</URL>
        <Description>CVE-2019-2503</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2507</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.43-45.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2507.html</URL>
        <Description>CVE-2019-2507</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2529</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.43-45.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2529.html</URL>
        <Description>CVE-2019-2529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136037</URL>
        <Description>SUSE Bug 1136037</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2531</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.43-45.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2531.html</URL>
        <Description>CVE-2019-2531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2019-2534</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.43-45.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2534.html</URL>
        <Description>CVE-2019-2534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2537</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libmysql56client18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-32bit-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libmysql56client_r18-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-bench-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-client-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-errormessages-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-test-5.6.43-45.1</ProductID>
        <ProductID>openSUSE Leap 42.3:mysql-community-server-tools-5.6.43-45.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2537.html</URL>
        <Description>CVE-2019-2537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136037</URL>
        <Description>SUSE Bug 1136037</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
