<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libmariadbd-devel-10.6.4-2.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11038</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libmariadbd-devel-10.6.4-2.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libmariadbd-devel-10.6.4-2.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11038</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-0903/</URL>
      <Description>SUSE CVE CVE-2006-0903 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-4226/</URL>
      <Description>SUSE CVE CVE-2006-4226 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-5969/</URL>
      <Description>SUSE CVE CVE-2007-5969 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-6303/</URL>
      <Description>SUSE CVE CVE-2007-6303 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-6304/</URL>
      <Description>SUSE CVE CVE-2007-6304 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-2079/</URL>
      <Description>SUSE CVE CVE-2008-2079 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4879/</URL>
      <Description>SUSE CVE CVE-2015-4879 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0505/</URL>
      <Description>SUSE CVE CVE-2016-0505 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0598/</URL>
      <Description>SUSE CVE CVE-2016-0598 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0609/</URL>
      <Description>SUSE CVE CVE-2016-0609 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0641/</URL>
      <Description>SUSE CVE CVE-2016-0641 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0649/</URL>
      <Description>SUSE CVE CVE-2016-0649 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2047/</URL>
      <Description>SUSE CVE CVE-2016-2047 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5440/</URL>
      <Description>SUSE CVE CVE-2016-5440 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5584/</URL>
      <Description>SUSE CVE CVE-2016-5584 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5624/</URL>
      <Description>SUSE CVE CVE-2016-5624 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6664/</URL>
      <Description>SUSE CVE CVE-2016-6664 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7440/</URL>
      <Description>SUSE CVE CVE-2016-7440 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8283/</URL>
      <Description>SUSE CVE CVE-2016-8283 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10320/</URL>
      <Description>SUSE CVE CVE-2017-10320 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10378/</URL>
      <Description>SUSE CVE CVE-2017-10378 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-10384/</URL>
      <Description>SUSE CVE CVE-2017-10384 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3243/</URL>
      <Description>SUSE CVE CVE-2017-3243 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3257/</URL>
      <Description>SUSE CVE CVE-2017-3257 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3265/</URL>
      <Description>SUSE CVE CVE-2017-3265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3302/</URL>
      <Description>SUSE CVE CVE-2017-3302 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3308/</URL>
      <Description>SUSE CVE CVE-2017-3308 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3312/</URL>
      <Description>SUSE CVE CVE-2017-3312 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3313/</URL>
      <Description>SUSE CVE CVE-2017-3313 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3318/</URL>
      <Description>SUSE CVE CVE-2017-3318 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3456/</URL>
      <Description>SUSE CVE CVE-2017-3456 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3636/</URL>
      <Description>SUSE CVE CVE-2017-3636 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2562/</URL>
      <Description>SUSE CVE CVE-2018-2562 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2668/</URL>
      <Description>SUSE CVE CVE-2018-2668 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2755/</URL>
      <Description>SUSE CVE CVE-2018-2755 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2767/</URL>
      <Description>SUSE CVE CVE-2018-2767 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2781/</URL>
      <Description>SUSE CVE CVE-2018-2781 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2782/</URL>
      <Description>SUSE CVE CVE-2018-2782 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-2786/</URL>
      <Description>SUSE CVE CVE-2018-2786 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3058/</URL>
      <Description>SUSE CVE CVE-2018-3058 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3060/</URL>
      <Description>SUSE CVE CVE-2018-3060 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3064/</URL>
      <Description>SUSE CVE CVE-2018-3064 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3156/</URL>
      <Description>SUSE CVE CVE-2018-3156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3162/</URL>
      <Description>SUSE CVE CVE-2018-3162 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3174/</URL>
      <Description>SUSE CVE CVE-2018-3174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3185/</URL>
      <Description>SUSE CVE CVE-2018-3185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3200/</URL>
      <Description>SUSE CVE CVE-2018-3200 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3282/</URL>
      <Description>SUSE CVE CVE-2018-3282 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-18901/</URL>
      <Description>SUSE CVE CVE-2019-18901 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2503/</URL>
      <Description>SUSE CVE CVE-2019-2503 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2510/</URL>
      <Description>SUSE CVE CVE-2019-2510 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2614/</URL>
      <Description>SUSE CVE CVE-2019-2614 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2758/</URL>
      <Description>SUSE CVE CVE-2019-2758 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2805/</URL>
      <Description>SUSE CVE CVE-2019-2805 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-2974/</URL>
      <Description>SUSE CVE CVE-2019-2974 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13249/</URL>
      <Description>SUSE CVE CVE-2020-13249 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14789/</URL>
      <Description>SUSE CVE CVE-2020-14789 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14812/</URL>
      <Description>SUSE CVE CVE-2020-14812 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15180/</URL>
      <Description>SUSE CVE CVE-2020-15180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2574/</URL>
      <Description>SUSE CVE CVE-2020-2574 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-2752/</URL>
      <Description>SUSE CVE CVE-2020-2752 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-7221/</URL>
      <Description>SUSE CVE CVE-2020-7221 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2154/</URL>
      <Description>SUSE CVE CVE-2021-2154 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2372/</URL>
      <Description>SUSE CVE CVE-2021-2372 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-2389/</URL>
      <Description>SUSE CVE CVE-2021-2389 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmariadbd-devel-10.6.4-2.1">
      <FullProductName ProductID="libmariadbd-devel-10.6.4-2.1">libmariadbd-devel-10.6.4-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmariadbd19-10.6.4-2.1">
      <FullProductName ProductID="libmariadbd19-10.6.4-2.1">libmariadbd19-10.6.4-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-10.6.4-2.1">
      <FullProductName ProductID="mariadb-10.6.4-2.1">mariadb-10.6.4-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-bench-10.6.4-2.1">
      <FullProductName ProductID="mariadb-bench-10.6.4-2.1">mariadb-bench-10.6.4-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-client-10.6.4-2.1">
      <FullProductName ProductID="mariadb-client-10.6.4-2.1">mariadb-client-10.6.4-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-errormessages-10.6.4-2.1">
      <FullProductName ProductID="mariadb-errormessages-10.6.4-2.1">mariadb-errormessages-10.6.4-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-galera-10.6.4-2.1">
      <FullProductName ProductID="mariadb-galera-10.6.4-2.1">mariadb-galera-10.6.4-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-rpm-macros-10.6.4-2.1">
      <FullProductName ProductID="mariadb-rpm-macros-10.6.4-2.1">mariadb-rpm-macros-10.6.4-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-test-10.6.4-2.1">
      <FullProductName ProductID="mariadb-test-10.6.4-2.1">mariadb-test-10.6.4-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-tools-10.6.4-2.1">
      <FullProductName ProductID="mariadb-tools-10.6.4-2.1">mariadb-tools-10.6.4-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmariadbd-devel-10.6.4-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1">libmariadbd-devel-10.6.4-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmariadbd19-10.6.4-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1">libmariadbd19-10.6.4-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-10.6.4-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-10.6.4-2.1">mariadb-10.6.4-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-bench-10.6.4-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1">mariadb-bench-10.6.4-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-client-10.6.4-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-client-10.6.4-2.1">mariadb-client-10.6.4-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-errormessages-10.6.4-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1">mariadb-errormessages-10.6.4-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-galera-10.6.4-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1">mariadb-galera-10.6.4-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-rpm-macros-10.6.4-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1">mariadb-rpm-macros-10.6.4-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-test-10.6.4-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-test-10.6.4-2.1">mariadb-test-10.6.4-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-tools-10.6.4-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1">mariadb-tools-10.6.4-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.</Note>
    </Notes>
    <CVE>CVE-2006-0903</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-0903.html</URL>
        <Description>CVE-2006-0903</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/163157</URL>
        <Description>SUSE Bug 163157</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.</Note>
    </Notes>
    <CVE>CVE-2006-4226</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-4226.html</URL>
        <Description>CVE-2006-4226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/201711</URL>
        <Description>SUSE Bug 201711</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.</Note>
    </Notes>
    <CVE>CVE-2007-5969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-5969.html</URL>
        <Description>CVE-2007-5969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/347223</URL>
        <Description>SUSE Bug 347223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/348003</URL>
        <Description>SUSE Bug 348003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/348307</URL>
        <Description>SUSE Bug 348307</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement.</Note>
    </Notes>
    <CVE>CVE-2007-6303</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-6303.html</URL>
        <Description>CVE-2007-6303</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/348003</URL>
        <Description>SUSE Bug 348003</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.</Note>
    </Notes>
    <CVE>CVE-2007-6304</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-6304.html</URL>
        <Description>CVE-2007-6304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/348003</URL>
        <Description>SUSE Bug 348003</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.</Note>
    </Notes>
    <CVE>CVE-2008-2079</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-2079.html</URL>
        <Description>CVE-2008-2079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/387746</URL>
        <Description>SUSE Bug 387746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/425079</URL>
        <Description>SUSE Bug 425079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/497546</URL>
        <Description>SUSE Bug 497546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/557669</URL>
        <Description>SUSE Bug 557669</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2015-4879</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4879.html</URL>
        <Description>CVE-2015-4879</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958790</URL>
        <Description>SUSE Bug 958790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.</Note>
    </Notes>
    <CVE>CVE-2016-0505</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0505.html</URL>
        <Description>CVE-2016-0505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0598.html</URL>
        <Description>CVE-2016-0598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.</Note>
    </Notes>
    <CVE>CVE-2016-0609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:N/AC:H/Au:M/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0609.html</URL>
        <Description>CVE-2016-0609</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.</Note>
    </Notes>
    <CVE>CVE-2016-0641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:L/AC:L/Au:M/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0641.html</URL>
        <Description>CVE-2016-0641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.</Note>
    </Notes>
    <CVE>CVE-2016-0649</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0649.html</URL>
        <Description>CVE-2016-0649</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."</Note>
    </Notes>
    <CVE>CVE-2016-2047</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2047.html</URL>
        <Description>CVE-2016-2047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963806</URL>
        <Description>SUSE Bug 963806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote administrators to affect availability via vectors related to Server: RBR.</Note>
    </Notes>
    <CVE>CVE-2016-5440</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5440.html</URL>
        <Description>CVE-2016-5440</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989926</URL>
        <Description>SUSE Bug 989926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991616</URL>
        <Description>SUSE Bug 991616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.</Note>
    </Notes>
    <CVE>CVE-2016-5584</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5584.html</URL>
        <Description>CVE-2016-5584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005558</URL>
        <Description>SUSE Bug 1005558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-5624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5624.html</URL>
        <Description>CVE-2016-5624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005564</URL>
        <Description>SUSE Bug 1005564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.</Note>
    </Notes>
    <CVE>CVE-2016-6664</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6664.html</URL>
        <Description>CVE-2016-6664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008253</URL>
        <Description>SUSE Bug 1008253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020868</URL>
        <Description>SUSE Bug 1020868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020873</URL>
        <Description>SUSE Bug 1020873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998309</URL>
        <Description>SUSE Bug 998309</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.</Note>
    </Notes>
    <CVE>CVE-2016-7440</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7440.html</URL>
        <Description>CVE-2016-7440</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005581</URL>
        <Description>SUSE Bug 1005581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Types.</Note>
    </Notes>
    <CVE>CVE-2016-8283</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8283.html</URL>
        <Description>CVE-2016-8283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005582</URL>
        <Description>SUSE Bug 1005582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10320</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:A/AC:L/Au:M/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10320.html</URL>
        <Description>CVE-2017-10320</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064113</URL>
        <Description>SUSE Bug 1064113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064119</URL>
        <Description>SUSE Bug 1064119</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10378</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10378.html</URL>
        <Description>CVE-2017-10378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064115</URL>
        <Description>SUSE Bug 1064115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064119</URL>
        <Description>SUSE Bug 1064119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076505</URL>
        <Description>SUSE Bug 1076505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076506</URL>
        <Description>SUSE Bug 1076506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-10384</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10384.html</URL>
        <Description>CVE-2017-10384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064117</URL>
        <Description>SUSE Bug 1064117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064119</URL>
        <Description>SUSE Bug 1064119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076506</URL>
        <Description>SUSE Bug 1076506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3243</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3243.html</URL>
        <Description>CVE-2017-3243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020868</URL>
        <Description>SUSE Bug 1020868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020891</URL>
        <Description>SUSE Bug 1020891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.34 and earlier5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3257</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3257.html</URL>
        <Description>CVE-2017-3257</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020868</URL>
        <Description>SUSE Bug 1020868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020878</URL>
        <Description>SUSE Bug 1020878</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:C/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3265.html</URL>
        <Description>CVE-2017-3265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020868</URL>
        <Description>SUSE Bug 1020868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020885</URL>
        <Description>SUSE Bug 1020885</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.</Note>
    </Notes>
    <CVE>CVE-2017-3302</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3302.html</URL>
        <Description>CVE-2017-3302</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022428</URL>
        <Description>SUSE Bug 1022428</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034911</URL>
        <Description>SUSE Bug 1034911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3308</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3308.html</URL>
        <Description>CVE-2017-3308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048715</URL>
        <Description>SUSE Bug 1048715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3312</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3312.html</URL>
        <Description>CVE-2017-3312</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020868</URL>
        <Description>SUSE Bug 1020868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020873</URL>
        <Description>SUSE Bug 1020873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998309</URL>
        <Description>SUSE Bug 998309</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3313</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.8</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3313.html</URL>
        <Description>CVE-2017-3313</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020868</URL>
        <Description>SUSE Bug 1020868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020890</URL>
        <Description>SUSE Bug 1020890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034911</URL>
        <Description>SUSE Bug 1034911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).</Note>
    </Notes>
    <CVE>CVE-2017-3318</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3318.html</URL>
        <Description>CVE-2017-3318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020868</URL>
        <Description>SUSE Bug 1020868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020896</URL>
        <Description>SUSE Bug 1020896</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2017-3456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3456.html</URL>
        <Description>CVE-2017-3456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034850</URL>
        <Description>SUSE Bug 1034850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048715</URL>
        <Description>SUSE Bug 1048715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).</Note>
    </Notes>
    <CVE>CVE-2017-3636</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3636.html</URL>
        <Description>CVE-2017-3636</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049399</URL>
        <Description>SUSE Bug 1049399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054591</URL>
        <Description>SUSE Bug 1054591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076506</URL>
        <Description>SUSE Bug 1076506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2562</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2562.html</URL>
        <Description>CVE-2018-2562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078431</URL>
        <Description>SUSE Bug 1078431</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2668.html</URL>
        <Description>CVE-2018-2668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076369</URL>
        <Description>SUSE Bug 1076369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078431</URL>
        <Description>SUSE Bug 1078431</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2755</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2755.html</URL>
        <Description>CVE-2018-2755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-2767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2767.html</URL>
        <Description>CVE-2018-2767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088681</URL>
        <Description>SUSE Bug 1088681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101675</URL>
        <Description>SUSE Bug 1101675</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2781</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2781.html</URL>
        <Description>CVE-2018-2781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2782</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2782.html</URL>
        <Description>CVE-2018-2782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090518</URL>
        <Description>SUSE Bug 1090518</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-2786</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-2786.html</URL>
        <Description>CVE-2018-2786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089987</URL>
        <Description>SUSE Bug 1089987</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2018-3058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3058.html</URL>
        <Description>CVE-2018-3058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101676</URL>
        <Description>SUSE Bug 1101676</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3060</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3060.html</URL>
        <Description>CVE-2018-3060</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3064</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3064.html</URL>
        <Description>CVE-2018-3064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103342</URL>
        <Description>SUSE Bug 1103342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3156.html</URL>
        <Description>CVE-2018-3156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112417</URL>
        <Description>SUSE Bug 1112417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3162</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3162.html</URL>
        <Description>CVE-2018-3162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112415</URL>
        <Description>SUSE Bug 1112415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3174.html</URL>
        <Description>CVE-2018-3174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112368</URL>
        <Description>SUSE Bug 1112368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3185.html</URL>
        <Description>CVE-2018-3185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112384</URL>
        <Description>SUSE Bug 1112384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3200</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3200.html</URL>
        <Description>CVE-2018-3200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112404</URL>
        <Description>SUSE Bug 1112404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2018-3282</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3282.html</URL>
        <Description>CVE-2018-3282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112432</URL>
        <Description>SUSE Bug 1112432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116686</URL>
        <Description>SUSE Bug 1116686</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A UNIX Symbolic Link (Symlink) Following vulnerability in the mysql-systemd-helper of the mariadb packaging of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allows local attackers to change the permissions of arbitrary files to 0640. This issue affects: SUSE Linux Enterprise Server 12 mariadb versions prior to 10.2.31-3.25.1. SUSE Linux Enterprise Server 15 mariadb versions prior to 10.2.31-3.26.1.</Note>
    </Notes>
    <CVE>CVE-2019-18901</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-18901.html</URL>
        <Description>CVE-2019-18901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160285</URL>
        <Description>SUSE Bug 1160285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160895</URL>
        <Description>SUSE Bug 1160895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection Handling). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Difficult to exploit vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.4 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2503</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2503.html</URL>
        <Description>CVE-2019-2503</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2510</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2510.html</URL>
        <Description>CVE-2019-2510</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122198</URL>
        <Description>SUSE Bug 1122198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2614</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2614.html</URL>
        <Description>CVE-2019-2614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132826</URL>
        <Description>SUSE Bug 1132826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136035</URL>
        <Description>SUSE Bug 1136035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141798</URL>
        <Description>SUSE Bug 1141798</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2758</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2758.html</URL>
        <Description>CVE-2019-2758</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141798</URL>
        <Description>SUSE Bug 1141798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156669</URL>
        <Description>SUSE Bug 1156669</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2805.html</URL>
        <Description>CVE-2019-2805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132826</URL>
        <Description>SUSE Bug 1132826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141798</URL>
        <Description>SUSE Bug 1141798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156669</URL>
        <Description>SUSE Bug 1156669</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2019-2974</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-2974.html</URL>
        <Description>CVE-2019-2974</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154162</URL>
        <Description>SUSE Bug 1154162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156669</URL>
        <Description>SUSE Bug 1156669</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libmariadb/mariadb_lib.c in MariaDB Connector/C before 3.1.8 does not properly validate the content of an OK packet received from a server. NOTE: although mariadb_lib.c was originally based on code shipped for MySQL, this issue does not affect any MySQL components supported by Oracle.</Note>
    </Notes>
    <CVE>CVE-2020-13249</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13249.html</URL>
        <Description>CVE-2020-13249</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-14789</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14789.html</URL>
        <Description>CVE-2020-14789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178428</URL>
        <Description>SUSE Bug 1178428</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-14812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14812.html</URL>
        <Description>CVE-2020-14812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178428</URL>
        <Description>SUSE Bug 1178428</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.</Note>
    </Notes>
    <CVE>CVE-2020-15180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15180.html</URL>
        <Description>CVE-2020-15180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177472</URL>
        <Description>SUSE Bug 1177472</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-2574</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2574.html</URL>
        <Description>CVE-2020-2574</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161085</URL>
        <Description>SUSE Bug 1161085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162388</URL>
        <Description>SUSE Bug 1162388</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2020-2752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-2752.html</URL>
        <Description>CVE-2020-2752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171550</URL>
        <Description>SUSE Bug 1171550</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mysql_install_db in MariaDB 10.4.7 through 10.4.11 allows privilege escalation from the mysql user account to root because chown and chmod are performed unsafely, as demonstrated by a symlink attack on a chmod 04755 of auth_pam_tool_dir/auth_pam_tool. NOTE: this does not affect the Oracle MySQL product, which implements mysql_install_db differently.</Note>
    </Notes>
    <CVE>CVE-2020-7221</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-7221.html</URL>
        <Description>CVE-2020-7221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160285</URL>
        <Description>SUSE Bug 1160285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160868</URL>
        <Description>SUSE Bug 1160868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160895</URL>
        <Description>SUSE Bug 1160895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2021-2154</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2154.html</URL>
        <Description>CVE-2021-2154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185872</URL>
        <Description>SUSE Bug 1185872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199955</URL>
        <Description>SUSE Bug 1199955</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2021-2372</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2372.html</URL>
        <Description>CVE-2021-2372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188549</URL>
        <Description>SUSE Bug 1188549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189320</URL>
        <Description>SUSE Bug 1189320</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199955</URL>
        <Description>SUSE Bug 1199955</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).</Note>
    </Notes>
    <CVE>CVE-2021-2389</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.6.4-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-2389.html</URL>
        <Description>CVE-2021-2389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188549</URL>
        <Description>SUSE Bug 1188549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189320</URL>
        <Description>SUSE Bug 1189320</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199955</URL>
        <Description>SUSE Bug 1199955</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
