<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Recommended update for mariadb, mariadb-connector-c</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2019:1441-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-06-06T16:15:12Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-06-06T16:15:12Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-06-06T16:15:12Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Recommended update for mariadb, mariadb-connector-c</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for mariadb to version 10.2.22 fixes the following issues:

Security issues fixed: 

- Update to MariaDB 10.2.22 GA:
  * CVE-2019-2510: (bsc#1122198)
  * CVE-2019-2537: (bsc#1122198)
- Update to MariaDB 10.2.19 GA (bsc#1116686):
  * CVE-2018-3282: (bsc#1112432)
  * CVE-2016-9843: (bsc#1013882)
  * CVE-2018-3174: (bsc#1112368)
  * CVE-2018-3143: (bsc#1112421)
  * CVE-2018-3156: (bsc#1112417)
  * CVE-2018-3251: (bsc#1112397)
  * CVE-2018-3185: (bsc#1112384)
  * CVE-2018-3277: (bsc#1112391)
  * CVE-2018-3162: (bsc#1112415)
  * CVE-2018-3173: (bsc#1112386)
  * CVE-2018-3200: (bsc#1112404)
  * CVE-2018-3284: (bsc#1112377)
- Update to MariaDB 10.2.18 GA:
  * CVE-2017-10320: (bsc#1064113)
  * CVE-2017-10365: (bsc#1064114)
  * CVE-2017-15365: (bsc#1072167)
  * CVE-2018-3058: (bsc#1101676)
  * CVE-2018-3063: (bsc#1101677)
  * CVE-2018-3064: (bsc#1103342)
  * CVE-2018-3066: (bsc#1101678)
  * CVE-2018-2759, CVE-2018-2777, CVE-2018-2786, CVE-2018-2810, CVE-2018-3060

Other issues fixed:

- Fixed an issue where mysl_install_db fails due to incorrect basedir (bsc#1127027).
- Fixed an issue where the lograte was not working (bsc#1112767).
- Remove xtrabackup dependency  as MariaDB ships a build in mariabackup so xtrabackup is not needed (bsc#1122475).
- Fixed database corruption after renaming a prefix-indexed column (bsc#1120041).
- Remove PerconaFT from the package as it has AGPL licence (bsc#1118754).

The complete changelog can be found at:  https://mariadb.com/kb/en/library/mariadb-10222-changelog/
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2019-1441,SUSE-OpenStack-Cloud-7-2019-1441</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      <Description>Link for SUSE-SU-2019:1441-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html</URL>
      <Description>E-Mail link for SUSE-SU-2019:1441-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013882</URL>
      <Description>SUSE Bug 1013882</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1064113</URL>
      <Description>SUSE Bug 1064113</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1064114</URL>
      <Description>SUSE Bug 1064114</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1072167</URL>
      <Description>SUSE Bug 1072167</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101676</URL>
      <Description>SUSE Bug 1101676</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101677</URL>
      <Description>SUSE Bug 1101677</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1101678</URL>
      <Description>SUSE Bug 1101678</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1103342</URL>
      <Description>SUSE Bug 1103342</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112368</URL>
      <Description>SUSE Bug 1112368</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112377</URL>
      <Description>SUSE Bug 1112377</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112384</URL>
      <Description>SUSE Bug 1112384</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112386</URL>
      <Description>SUSE Bug 1112386</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112391</URL>
      <Description>SUSE Bug 1112391</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112397</URL>
      <Description>SUSE Bug 1112397</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112404</URL>
      <Description>SUSE Bug 1112404</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112415</URL>
      <Description>SUSE Bug 1112415</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112417</URL>
      <Description>SUSE Bug 1112417</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112421</URL>
      <Description>SUSE Bug 1112421</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112432</URL>
      <Description>SUSE Bug 1112432</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112767</URL>
      <Description>SUSE Bug 1112767</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1116686</URL>
      <Description>SUSE Bug 1116686</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1118754</URL>
      <Description>SUSE Bug 1118754</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120041</URL>
      <Description>SUSE Bug 1120041</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1122198</URL>
      <Description>SUSE Bug 1122198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1122475</URL>
      <Description>SUSE Bug 1122475</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1127027</URL>
      <Description>SUSE Bug 1127027</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9843/</URL>
      <Description>SUSE CVE CVE-2016-9843 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10320/</URL>
      <Description>SUSE CVE CVE-2017-10320 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10365/</URL>
      <Description>SUSE CVE CVE-2017-10365 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15365/</URL>
      <Description>SUSE CVE CVE-2017-15365 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2759/</URL>
      <Description>SUSE CVE CVE-2018-2759 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2777/</URL>
      <Description>SUSE CVE CVE-2018-2777 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2786/</URL>
      <Description>SUSE CVE CVE-2018-2786 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2810/</URL>
      <Description>SUSE CVE CVE-2018-2810 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3058/</URL>
      <Description>SUSE CVE CVE-2018-3058 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3060/</URL>
      <Description>SUSE CVE CVE-2018-3060 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3063/</URL>
      <Description>SUSE CVE CVE-2018-3063 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3064/</URL>
      <Description>SUSE CVE CVE-2018-3064 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3066/</URL>
      <Description>SUSE CVE CVE-2018-3066 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3143/</URL>
      <Description>SUSE CVE CVE-2018-3143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3156/</URL>
      <Description>SUSE CVE CVE-2018-3156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3162/</URL>
      <Description>SUSE CVE CVE-2018-3162 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3173/</URL>
      <Description>SUSE CVE CVE-2018-3173 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3174/</URL>
      <Description>SUSE CVE CVE-2018-3174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3185/</URL>
      <Description>SUSE CVE CVE-2018-3185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3200/</URL>
      <Description>SUSE CVE CVE-2018-3200 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3251/</URL>
      <Description>SUSE CVE CVE-2018-3251 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3277/</URL>
      <Description>SUSE CVE CVE-2018-3277 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3282/</URL>
      <Description>SUSE CVE CVE-2018-3282 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3284/</URL>
      <Description>SUSE CVE CVE-2018-3284 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud 7">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud 7">
        <FullProductName ProductID="SUSE OpenStack Cloud 7" CPE="cpe:/o:suse:suse-openstack-cloud:7">SUSE OpenStack Cloud 7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmariadb-devel-3.0.7-1.6.1">
      <FullProductName ProductID="libmariadb-devel-3.0.7-1.6.1">libmariadb-devel-3.0.7-1.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmariadb3-3.0.7-1.6.1">
      <FullProductName ProductID="libmariadb3-3.0.7-1.6.1">libmariadb3-3.0.7-1.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmariadb3-64bit-3.0.7-1.6.1">
      <FullProductName ProductID="libmariadb3-64bit-3.0.7-1.6.1">libmariadb3-64bit-3.0.7-1.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmariadb_plugins-3.0.7-1.6.1">
      <FullProductName ProductID="libmariadb_plugins-3.0.7-1.6.1">libmariadb_plugins-3.0.7-1.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmariadbprivate-3.0.7-1.6.1">
      <FullProductName ProductID="libmariadbprivate-3.0.7-1.6.1">libmariadbprivate-3.0.7-1.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld-devel-10.2.22-10.1">
      <FullProductName ProductID="libmysqld-devel-10.2.22-10.1">libmysqld-devel-10.2.22-10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld19-10.2.22-10.1">
      <FullProductName ProductID="libmysqld19-10.2.22-10.1">libmysqld19-10.2.22-10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-10.2.22-10.1">
      <FullProductName ProductID="mariadb-10.2.22-10.1">mariadb-10.2.22-10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-bench-10.2.22-10.1">
      <FullProductName ProductID="mariadb-bench-10.2.22-10.1">mariadb-bench-10.2.22-10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-client-10.2.22-10.1">
      <FullProductName ProductID="mariadb-client-10.2.22-10.1">mariadb-client-10.2.22-10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-errormessages-10.2.22-10.1">
      <FullProductName ProductID="mariadb-errormessages-10.2.22-10.1">mariadb-errormessages-10.2.22-10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-galera-10.2.22-10.1">
      <FullProductName ProductID="mariadb-galera-10.2.22-10.1">mariadb-galera-10.2.22-10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-test-10.2.22-10.1">
      <FullProductName ProductID="mariadb-test-10.2.22-10.1">mariadb-test-10.2.22-10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-tools-10.2.22-10.1">
      <FullProductName ProductID="mariadb-tools-10.2.22-10.1">mariadb-tools-10.2.22-10.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmariadb3-3.0.7-1.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 7">
      <FullProductName ProductID="SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1">libmariadb3-3.0.7-1.6.1 as a component of SUSE OpenStack Cloud 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-10.2.22-10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 7">
      <FullProductName ProductID="SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1">mariadb-10.2.22-10.1 as a component of SUSE OpenStack Cloud 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-client-10.2.22-10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 7">
      <FullProductName ProductID="SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1">mariadb-client-10.2.22-10.1 as a component of SUSE OpenStack Cloud 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-errormessages-10.2.22-10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 7">
      <FullProductName ProductID="SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1">mariadb-errormessages-10.2.22-10.1 as a component of SUSE OpenStack Cloud 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-galera-10.2.22-10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 7">
      <FullProductName ProductID="SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1">mariadb-galera-10.2.22-10.1 as a component of SUSE OpenStack Cloud 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-tools-10.2.22-10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 7">
      <FullProductName ProductID="SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1">mariadb-tools-10.2.22-10.1 as a component of SUSE OpenStack Cloud 7</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.</Note>
    </Notes>
    <CVE>CVE-2016-9843</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9843.html</URL>
        <Description>CVE-2016-9843</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003580</URL>
        <Description>SUSE Bug 1003580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013882</URL>
        <Description>SUSE Bug 1013882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038505</URL>
        <Description>SUSE Bug 1038505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062104</URL>
        <Description>SUSE Bug 1062104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120866</URL>
        <Description>SUSE Bug 1120866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123150</URL>
        <Description>SUSE Bug 1123150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127473</URL>
        <Description>SUSE Bug 1127473</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184301</URL>
        <Description>SUSE Bug 1184301</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10320</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:A/AC:L/Au:M/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10320.html</URL>
        <Description>CVE-2017-10320</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064113</URL>
        <Description>SUSE Bug 1064113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064119</URL>
        <Description>SUSE Bug 1064119</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 3.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-10365</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:N/AC:L/Au:M/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10365.html</URL>
        <Description>CVE-2017-10365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064114</URL>
        <Description>SUSE Bug 1064114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064119</URL>
        <Description>SUSE Bug 1064119</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sql/event_data_objects.cc in MariaDB before 10.1.30 and 10.2.x before 10.2.10 and Percona XtraDB Cluster before 5.6.37-26.21-3 and 5.7.x before 5.7.19-29.22-3 allows remote authenticated users with SQL access to bypass intended access restrictions and replicate data definition language (DDL) statements to cluster nodes by leveraging incorrect ordering of DDL replication and ACL checking.</Note>
    </Notes>
    <CVE>CVE-2017-15365</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15365.html</URL>
        <Description>CVE-2017-15365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072167</URL>
        <Description>SUSE Bug 1072167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076506</URL>
        <Description>SUSE Bug 1076506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2759</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2759.html</URL>
        <Description>CVE-2018-2759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2777.html</URL>
        <Description>CVE-2018-2777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2786</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2786.html</URL>
        <Description>CVE-2018-2786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2810</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2810.html</URL>
        <Description>CVE-2018-2810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-3058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3058.html</URL>
        <Description>CVE-2018-3058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101676</URL>
        <Description>SUSE Bug 1101676</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3060</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3060.html</URL>
        <Description>CVE-2018-3060</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3063</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3063.html</URL>
        <Description>CVE-2018-3063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101677</URL>
        <Description>SUSE Bug 1101677</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3064</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3064.html</URL>
        <Description>CVE-2018-3064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103342</URL>
        <Description>SUSE Bug 1103342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-3066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3066.html</URL>
        <Description>CVE-2018-3066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101678</URL>
        <Description>SUSE Bug 1101678</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3143.html</URL>
        <Description>CVE-2018-3143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112421</URL>
        <Description>SUSE Bug 1112421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3156.html</URL>
        <Description>CVE-2018-3156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112417</URL>
        <Description>SUSE Bug 1112417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3162</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3162.html</URL>
        <Description>CVE-2018-3162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112415</URL>
        <Description>SUSE Bug 1112415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3173</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3173.html</URL>
        <Description>CVE-2018-3173</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112386</URL>
        <Description>SUSE Bug 1112386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3174.html</URL>
        <Description>CVE-2018-3174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112368</URL>
        <Description>SUSE Bug 1112368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3185.html</URL>
        <Description>CVE-2018-3185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112384</URL>
        <Description>SUSE Bug 1112384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3200</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3200.html</URL>
        <Description>CVE-2018-3200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112404</URL>
        <Description>SUSE Bug 1112404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3251.html</URL>
        <Description>CVE-2018-3251</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112397</URL>
        <Description>SUSE Bug 1112397</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3277</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3277.html</URL>
        <Description>CVE-2018-3277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112391</URL>
        <Description>SUSE Bug 1112391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3282</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3282.html</URL>
        <Description>CVE-2018-3282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112432</URL>
        <Description>SUSE Bug 1112432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3284</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud 7:libmariadb3-3.0.7-1.6.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-client-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-errormessages-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-galera-10.2.22-10.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:mariadb-tools-10.2.22-10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191441-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3284.html</URL>
        <Description>CVE-2018-3284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112377</URL>
        <Description>SUSE Bug 1112377</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
