<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mariadb</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:1382-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-05-23T08:16:11Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-05-23T08:16:11Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-05-23T08:16:11Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mariadb</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

MariaDB was updated to 10.0.35 (bsc#1090518)

Notable changes:

* PCRE updated to 8.42
* XtraDB updated to 5.6.39-83.1
* TokuDB updated to 5.6.39-83.1
* InnoDB updated to 5.6.40
* The embedded server library now supports SSL when connecting
  to remote servers [bsc#1088681], [CVE-2018-2767]
* MDEV-15249 - Crash in MVCC read after IMPORT TABLESPACE
* MDEV-14988 - innodb_read_only tries to modify files if
  transactions were recovered in COMMITTED state
* MDEV-14773 - DROP TABLE hangs for InnoDB table with FULLTEXT index
* MDEV-15723 - Crash in INFORMATION_SCHEMA.INNODB_SYS_TABLES when
  accessing corrupted record
* fixes for the following security vulnerabilities:
  CVE-2018-2782, CVE-2018-2784, CVE-2018-2787, CVE-2018-2766,
  CVE-2018-2755, CVE-2018-2819, CVE-2018-2817, CVE-2018-2761,
  CVE-2018-2781, CVE-2018-2771, CVE-2018-2813
* Release notes and changelog:

    * https://kb.askmonty.org/en/mariadb-10035-release-notes
    * https://kb.askmonty.org/en/mariadb-10035-changelog
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SERVER-12-2018-966</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      <Description>Link for SUSE-SU-2018:1382-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:1382-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1088681</URL>
      <Description>SUSE Bug 1088681</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1090518</URL>
      <Description>SUSE Bug 1090518</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2755/</URL>
      <Description>SUSE CVE CVE-2018-2755 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2761/</URL>
      <Description>SUSE CVE CVE-2018-2761 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2766/</URL>
      <Description>SUSE CVE CVE-2018-2766 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2767/</URL>
      <Description>SUSE CVE CVE-2018-2767 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2771/</URL>
      <Description>SUSE CVE CVE-2018-2771 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2781/</URL>
      <Description>SUSE CVE CVE-2018-2781 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2782/</URL>
      <Description>SUSE CVE CVE-2018-2782 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2784/</URL>
      <Description>SUSE CVE CVE-2018-2784 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2787/</URL>
      <Description>SUSE CVE CVE-2018-2787 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2813/</URL>
      <Description>SUSE CVE CVE-2018-2813 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2817/</URL>
      <Description>SUSE CVE CVE-2018-2817 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2819/</URL>
      <Description>SUSE CVE CVE-2018-2819 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS" CPE="cpe:/o:suse:sles-ltss:12">SUSE Linux Enterprise Server 12-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient-devel-10.0.35-20.46.1">
      <FullProductName ProductID="libmysqlclient-devel-10.0.35-20.46.1">libmysqlclient-devel-10.0.35-20.46.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-10.0.35-20.46.1">
      <FullProductName ProductID="libmysqlclient18-10.0.35-20.46.1">libmysqlclient18-10.0.35-20.46.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-32bit-10.0.35-20.46.1">
      <FullProductName ProductID="libmysqlclient18-32bit-10.0.35-20.46.1">libmysqlclient18-32bit-10.0.35-20.46.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient_r18-10.0.35-20.46.1">
      <FullProductName ProductID="libmysqlclient_r18-10.0.35-20.46.1">libmysqlclient_r18-10.0.35-20.46.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld-devel-10.0.35-20.46.1">
      <FullProductName ProductID="libmysqld-devel-10.0.35-20.46.1">libmysqld-devel-10.0.35-20.46.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld18-10.0.35-20.46.1">
      <FullProductName ProductID="libmysqld18-10.0.35-20.46.1">libmysqld18-10.0.35-20.46.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-10.0.35-20.46.1">
      <FullProductName ProductID="mariadb-10.0.35-20.46.1">mariadb-10.0.35-20.46.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-client-10.0.35-20.46.1">
      <FullProductName ProductID="mariadb-client-10.0.35-20.46.1">mariadb-client-10.0.35-20.46.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-errormessages-10.0.35-20.46.1">
      <FullProductName ProductID="mariadb-errormessages-10.0.35-20.46.1">mariadb-errormessages-10.0.35-20.46.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-tools-10.0.35-20.46.1">
      <FullProductName ProductID="mariadb-tools-10.0.35-20.46.1">mariadb-tools-10.0.35-20.46.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysqlclient-devel-10.0.35-20.46.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1">libmysqlclient-devel-10.0.35-20.46.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-10.0.35-20.46.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1">libmysqlclient18-10.0.35-20.46.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-32bit-10.0.35-20.46.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1">libmysqlclient18-32bit-10.0.35-20.46.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient_r18-10.0.35-20.46.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1">libmysqlclient_r18-10.0.35-20.46.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqld-devel-10.0.35-20.46.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1">libmysqld-devel-10.0.35-20.46.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqld18-10.0.35-20.46.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1">libmysqld18-10.0.35-20.46.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-10.0.35-20.46.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1">mariadb-10.0.35-20.46.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-client-10.0.35-20.46.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1">mariadb-client-10.0.35-20.46.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-errormessages-10.0.35-20.46.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1">mariadb-errormessages-10.0.35-20.46.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-tools-10.0.35-20.46.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1">mariadb-tools-10.0.35-20.46.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2755</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2755.html</URL>
        <Description>CVE-2018-2755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2761</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2761.html</URL>
        <Description>CVE-2018-2761</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2766.html</URL>
        <Description>CVE-2018-2766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2767.html</URL>
        <Description>CVE-2018-2767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088681</URL>
        <Description>SUSE Bug 1088681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101675</URL>
        <Description>SUSE Bug 1101675</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2771.html</URL>
        <Description>CVE-2018-2771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2781</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2781.html</URL>
        <Description>CVE-2018-2781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2782</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2782.html</URL>
        <Description>CVE-2018-2782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2784</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2784.html</URL>
        <Description>CVE-2018-2784</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2787</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2787.html</URL>
        <Description>CVE-2018-2787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2813</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2813.html</URL>
        <Description>CVE-2018-2813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2817.html</URL>
        <Description>CVE-2018-2817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2819</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient18-32bit-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqlclient_r18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld-devel-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libmysqld18-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-client-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-errormessages-10.0.35-20.46.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:mariadb-tools-10.0.35-20.46.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20181382-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2819.html</URL>
        <Description>CVE-2018-2819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
