<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mariadb</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:0327-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-03-23T11:15:20Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-03-23T11:15:20Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-03-23T11:15:20Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mariadb</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for mariadb to version 10.2.22 fixes the following issues:

Security issues fixed:

- CVE-2019-2510: Fixed a vulnerability which can lead to MySQL compromise and lead to Denial of Service (bsc#1122198). 
- CVE-2019-2537: Fixed a vulnerability which can lead to MySQL compromise and lead to Denial of Service (bsc#1122198).
- CVE-2018-3284: Fixed InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112377)
- CVE-2018-3282: Server Storage Engines unspecified vulnerability (CPU Oct 2018) (bsc#1112432)
- CVE-2018-3277: Fixed InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112391)
- CVE-2018-3251: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112397)
- CVE-2018-3200: Fixed InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112404)
- CVE-2018-3185: Fixed InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112384)
- CVE-2018-3174: Client programs unspecified vulnerability (CPU Oct 2018) (bsc#1112368)
- CVE-2018-3173: Fixed InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112386)
- CVE-2018-3162: Fixed InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112415)
- CVE-2018-3156: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112417)
- CVE-2018-3143: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112421)
- CVE-2018-3066: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Options). (bsc#1101678)
- CVE-2018-3064: InnoDB unspecified vulnerability (CPU Jul 2018) (bsc#1103342)
- CVE-2018-3063: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Security Privileges). (bsc#1101677)
- CVE-2018-3058: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent MyISAM). (bsc#1101676)
- CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)

Non-security issues fixed:

- Fixed an issue where mysl_install_db fails due to incorrect basedir (bsc#1127027).
- Fixed an issue where the lograte was not working (bsc#1112767).
- Backport Information Schema CHECK_CONSTRAINTS Table.
- Maximum value of table_definition_cache is now 2097152.
- InnoDB ALTER TABLE fixes.
- Galera crash recovery fixes.
- Encryption fixes.
- Remove xtrabackup dependency  as MariaDB ships a build in mariabackup so xtrabackup is not needed (bsc#1122475).
- Maria DB testsuite - test main.plugin_auth failed (bsc#1111859)
- Maria DB testsuite - test encryption.second_plugin-12863 failed (bsc#1111858)
- Remove PerconaFT from the package as it has AGPL licence (bsc#1118754)
- remove PerconaFT from the package as it has AGPL licence (bsc#1118754)
- Database corruption after renaming a prefix-indexed column (bsc#1120041)


Release notes and changelog:

- https://mariadb.com/kb/en/library/mariadb-10222-release-notes
- https://mariadb.com/kb/en/library/mariadb-10222-changelog/

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-327</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:0327-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013882</URL>
      <Description>SUSE Bug 1013882</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101676</URL>
      <Description>SUSE Bug 1101676</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101677</URL>
      <Description>SUSE Bug 1101677</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101678</URL>
      <Description>SUSE Bug 1101678</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1103342</URL>
      <Description>SUSE Bug 1103342</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111858</URL>
      <Description>SUSE Bug 1111858</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111859</URL>
      <Description>SUSE Bug 1111859</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112368</URL>
      <Description>SUSE Bug 1112368</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112377</URL>
      <Description>SUSE Bug 1112377</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112384</URL>
      <Description>SUSE Bug 1112384</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112386</URL>
      <Description>SUSE Bug 1112386</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112391</URL>
      <Description>SUSE Bug 1112391</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112397</URL>
      <Description>SUSE Bug 1112397</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112404</URL>
      <Description>SUSE Bug 1112404</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112415</URL>
      <Description>SUSE Bug 1112415</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112417</URL>
      <Description>SUSE Bug 1112417</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112421</URL>
      <Description>SUSE Bug 1112421</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112432</URL>
      <Description>SUSE Bug 1112432</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112767</URL>
      <Description>SUSE Bug 1112767</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1116686</URL>
      <Description>SUSE Bug 1116686</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1118754</URL>
      <Description>SUSE Bug 1118754</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120041</URL>
      <Description>SUSE Bug 1120041</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1122198</URL>
      <Description>SUSE Bug 1122198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1122475</URL>
      <Description>SUSE Bug 1122475</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1127027</URL>
      <Description>SUSE Bug 1127027</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9843/</URL>
      <Description>SUSE CVE CVE-2016-9843 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3058/</URL>
      <Description>SUSE CVE CVE-2018-3058 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3060/</URL>
      <Description>SUSE CVE CVE-2018-3060 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3063/</URL>
      <Description>SUSE CVE CVE-2018-3063 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3064/</URL>
      <Description>SUSE CVE CVE-2018-3064 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3066/</URL>
      <Description>SUSE CVE CVE-2018-3066 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3143/</URL>
      <Description>SUSE CVE CVE-2018-3143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3156/</URL>
      <Description>SUSE CVE CVE-2018-3156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3162/</URL>
      <Description>SUSE CVE CVE-2018-3162 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3173/</URL>
      <Description>SUSE CVE CVE-2018-3173 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3174/</URL>
      <Description>SUSE CVE CVE-2018-3174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3185/</URL>
      <Description>SUSE CVE CVE-2018-3185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3200/</URL>
      <Description>SUSE CVE CVE-2018-3200 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3251/</URL>
      <Description>SUSE CVE CVE-2018-3251 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3277/</URL>
      <Description>SUSE CVE CVE-2018-3277 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3282/</URL>
      <Description>SUSE CVE CVE-2018-3282 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3284/</URL>
      <Description>SUSE CVE CVE-2018-3284 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2510/</URL>
      <Description>SUSE CVE CVE-2019-2510 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2537/</URL>
      <Description>SUSE CVE CVE-2019-2537 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld-devel-10.2.22-lp150.2.9.1">
      <FullProductName ProductID="libmysqld-devel-10.2.22-lp150.2.9.1">libmysqld-devel-10.2.22-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld19-10.2.22-lp150.2.9.1">
      <FullProductName ProductID="libmysqld19-10.2.22-lp150.2.9.1">libmysqld19-10.2.22-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-10.2.22-lp150.2.9.1">
      <FullProductName ProductID="mariadb-10.2.22-lp150.2.9.1">mariadb-10.2.22-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-bench-10.2.22-lp150.2.9.1">
      <FullProductName ProductID="mariadb-bench-10.2.22-lp150.2.9.1">mariadb-bench-10.2.22-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-client-10.2.22-lp150.2.9.1">
      <FullProductName ProductID="mariadb-client-10.2.22-lp150.2.9.1">mariadb-client-10.2.22-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-errormessages-10.2.22-lp150.2.9.1">
      <FullProductName ProductID="mariadb-errormessages-10.2.22-lp150.2.9.1">mariadb-errormessages-10.2.22-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-galera-10.2.22-lp150.2.9.1">
      <FullProductName ProductID="mariadb-galera-10.2.22-lp150.2.9.1">mariadb-galera-10.2.22-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-test-10.2.22-lp150.2.9.1">
      <FullProductName ProductID="mariadb-test-10.2.22-lp150.2.9.1">mariadb-test-10.2.22-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-tools-10.2.22-lp150.2.9.1">
      <FullProductName ProductID="mariadb-tools-10.2.22-lp150.2.9.1">mariadb-tools-10.2.22-lp150.2.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysqld-devel-10.2.22-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1">libmysqld-devel-10.2.22-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqld19-10.2.22-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1">libmysqld19-10.2.22-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-10.2.22-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1">mariadb-10.2.22-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-bench-10.2.22-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1">mariadb-bench-10.2.22-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-client-10.2.22-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1">mariadb-client-10.2.22-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-errormessages-10.2.22-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1">mariadb-errormessages-10.2.22-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-galera-10.2.22-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1">mariadb-galera-10.2.22-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-test-10.2.22-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1">mariadb-test-10.2.22-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-tools-10.2.22-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1">mariadb-tools-10.2.22-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.</Note>
    </Notes>
    <CVE>CVE-2016-9843</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9843.html</URL>
        <Description>CVE-2016-9843</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003580</URL>
        <Description>SUSE Bug 1003580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013882</URL>
        <Description>SUSE Bug 1013882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038505</URL>
        <Description>SUSE Bug 1038505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062104</URL>
        <Description>SUSE Bug 1062104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120866</URL>
        <Description>SUSE Bug 1120866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123150</URL>
        <Description>SUSE Bug 1123150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127473</URL>
        <Description>SUSE Bug 1127473</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184301</URL>
        <Description>SUSE Bug 1184301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-3058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3058.html</URL>
        <Description>CVE-2018-3058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101676</URL>
        <Description>SUSE Bug 1101676</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3060</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3060.html</URL>
        <Description>CVE-2018-3060</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3063</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3063.html</URL>
        <Description>CVE-2018-3063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101677</URL>
        <Description>SUSE Bug 1101677</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3064</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3064.html</URL>
        <Description>CVE-2018-3064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103342</URL>
        <Description>SUSE Bug 1103342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-3066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3066.html</URL>
        <Description>CVE-2018-3066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101678</URL>
        <Description>SUSE Bug 1101678</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3143.html</URL>
        <Description>CVE-2018-3143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112421</URL>
        <Description>SUSE Bug 1112421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3156.html</URL>
        <Description>CVE-2018-3156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112417</URL>
        <Description>SUSE Bug 1112417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3162</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3162.html</URL>
        <Description>CVE-2018-3162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112415</URL>
        <Description>SUSE Bug 1112415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3173</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3173.html</URL>
        <Description>CVE-2018-3173</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112386</URL>
        <Description>SUSE Bug 1112386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3174.html</URL>
        <Description>CVE-2018-3174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112368</URL>
        <Description>SUSE Bug 1112368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3185.html</URL>
        <Description>CVE-2018-3185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112384</URL>
        <Description>SUSE Bug 1112384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3200</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3200.html</URL>
        <Description>CVE-2018-3200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112404</URL>
        <Description>SUSE Bug 1112404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3251.html</URL>
        <Description>CVE-2018-3251</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112397</URL>
        <Description>SUSE Bug 1112397</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3277</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3277.html</URL>
        <Description>CVE-2018-3277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112391</URL>
        <Description>SUSE Bug 1112391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3282</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3282.html</URL>
        <Description>CVE-2018-3282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112432</URL>
        <Description>SUSE Bug 1112432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3284</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3284.html</URL>
        <Description>CVE-2018-3284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112377</URL>
        <Description>SUSE Bug 1112377</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2510</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2510.html</URL>
        <Description>CVE-2019-2510</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2537</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libmysqld-devel-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libmysqld19-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-bench-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-client-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-errormessages-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-galera-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-test-10.2.22-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:mariadb-tools-10.2.22-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2537.html</URL>
        <Description>CVE-2019-2537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136037</URL>
        <Description>SUSE Bug 1136037</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
