<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mysql-community-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1332-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-05-18T09:09:43Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-05-18T09:09:43Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-05-18T09:09:43Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mysql-community-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This mysql-community-server version update to 5.6.30 fixes the following issues: 

Security issues fixed:
- fixed CVEs (boo#962779, boo#959724):
  CVE-2016-0705, CVE-2016-0639, CVE-2015-3194, CVE-2016-0640,
  CVE-2016-2047, CVE-2016-0644, CVE-2016-0646, CVE-2016-0647,
  CVE-2016-0648, CVE-2016-0649, CVE-2016-0650, CVE-2016-0665,
  CVE-2016-0666, CVE-2016-0641, CVE-2016-0642, CVE-2016-0655,
  CVE-2016-0661, CVE-2016-0668, CVE-2016-0643
- changes
  http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-30.html
  http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-29.html

Bugs fixed:
- don't delete the log data when migration fails
- add 'log-error' and 'secure-file-priv' configuration options
  (added via configuration-tweaks.tar.bz2) [boo#963810]
  * add '/etc/my.cnf.d/error_log.conf' that specifies
    'log-error = /var/log/mysql/mysqld.log'. If no path is set, the error
    log is written to '/var/lib/mysql/$HOSTNAME.err', which is not picked
    up by logrotate.
  * add '/etc/my.cnf.d/secure_file_priv.conf' which specifies that
    'LOAD DATA', 'SELECT ... INTO' and 'LOAD FILE()' will only work with
    files in the directory specified by 'secure-file-priv' option
    (='/var/lib/mysql-files').
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1332-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-5.6.30-16.2">
      <FullProductName ProductID="libmysql56client18-5.6.30-16.2">libmysql56client18-5.6.30-16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-32bit-5.6.30-16.2">
      <FullProductName ProductID="libmysql56client18-32bit-5.6.30-16.2">libmysql56client18-32bit-5.6.30-16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-5.6.30-16.2">
      <FullProductName ProductID="libmysql56client_r18-5.6.30-16.2">libmysql56client_r18-5.6.30-16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-32bit-5.6.30-16.2">
      <FullProductName ProductID="libmysql56client_r18-32bit-5.6.30-16.2">libmysql56client_r18-32bit-5.6.30-16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-5.6.30-16.2">
      <FullProductName ProductID="mysql-community-server-5.6.30-16.2">mysql-community-server-5.6.30-16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-bench-5.6.30-16.2">
      <FullProductName ProductID="mysql-community-server-bench-5.6.30-16.2">mysql-community-server-bench-5.6.30-16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-client-5.6.30-16.2">
      <FullProductName ProductID="mysql-community-server-client-5.6.30-16.2">mysql-community-server-client-5.6.30-16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-errormessages-5.6.30-16.2">
      <FullProductName ProductID="mysql-community-server-errormessages-5.6.30-16.2">mysql-community-server-errormessages-5.6.30-16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-test-5.6.30-16.2">
      <FullProductName ProductID="mysql-community-server-test-5.6.30-16.2">mysql-community-server-test-5.6.30-16.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-tools-5.6.30-16.2">
      <FullProductName ProductID="mysql-community-server-tools-5.6.30-16.2">mysql-community-server-tools-5.6.30-16.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysql56client18-5.6.30-16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2">libmysql56client18-5.6.30-16.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-32bit-5.6.30-16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2">libmysql56client18-32bit-5.6.30-16.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-5.6.30-16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2">libmysql56client_r18-5.6.30-16.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-32bit-5.6.30-16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2">libmysql56client_r18-32bit-5.6.30-16.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-5.6.30-16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2">mysql-community-server-5.6.30-16.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-bench-5.6.30-16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2">mysql-community-server-bench-5.6.30-16.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-client-5.6.30-16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2">mysql-community-server-client-5.6.30-16.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-errormessages-5.6.30-16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2">mysql-community-server-errormessages-5.6.30-16.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-test-5.6.30-16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2">mysql-community-server-test-5.6.30-16.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-tools-5.6.30-16.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2">mysql-community-server-tools-5.6.30-16.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.</Note>
    </Notes>
    <CVE>CVE-2015-3194</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3194.html</URL>
        <Description>CVE-2015-3194</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957812</URL>
        <Description>SUSE Bug 957812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957815</URL>
        <Description>SUSE Bug 957815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958768</URL>
        <Description>SUSE Bug 958768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990370</URL>
        <Description>SUSE Bug 990370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Pluggable Authentication.</Note>
    </Notes>
    <CVE>CVE-2016-0639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0639.html</URL>
        <Description>CVE-2016-0639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0640.html</URL>
        <Description>CVE-2016-0640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.</Note>
    </Notes>
    <CVE>CVE-2016-0641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:L/AC:L/Au:M/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0641.html</URL>
        <Description>CVE-2016-0641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.</Note>
    </Notes>
    <CVE>CVE-2016-0642</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:H/Au:M/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0642.html</URL>
        <Description>CVE-2016-0642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0643</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0643.html</URL>
        <Description>CVE-2016-0643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DDL.</Note>
    </Notes>
    <CVE>CVE-2016-0644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0644.html</URL>
        <Description>CVE-2016-0644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0646.html</URL>
        <Description>CVE-2016-0646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.</Note>
    </Notes>
    <CVE>CVE-2016-0647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0647.html</URL>
        <Description>CVE-2016-0647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to PS.</Note>
    </Notes>
    <CVE>CVE-2016-0648</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0648.html</URL>
        <Description>CVE-2016-0648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.</Note>
    </Notes>
    <CVE>CVE-2016-0649</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0649.html</URL>
        <Description>CVE-2016-0649</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to Replication.</Note>
    </Notes>
    <CVE>CVE-2016-0650</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0650.html</URL>
        <Description>CVE-2016-0650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-0655</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0655.html</URL>
        <Description>CVE-2016-0655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local users to affect availability via vectors related to Options.</Note>
    </Notes>
    <CVE>CVE-2016-0661</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0661.html</URL>
        <Description>CVE-2016-0661</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local users to affect availability via vectors related to Security: Encryption.</Note>
    </Notes>
    <CVE>CVE-2016-0665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0665.html</URL>
        <Description>CVE-2016-0665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to Security: Privileges.</Note>
    </Notes>
    <CVE>CVE-2016-0666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0666.html</URL>
        <Description>CVE-2016-0666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier and MariaDB 10.0.x before 10.0.24 and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-0668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:M/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0668.html</URL>
        <Description>CVE-2016-0668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.</Note>
    </Notes>
    <CVE>CVE-2016-0705</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0705.html</URL>
        <Description>CVE-2016-0705</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968044</URL>
        <Description>SUSE Bug 968044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968047</URL>
        <Description>SUSE Bug 968047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971238</URL>
        <Description>SUSE Bug 971238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."</Note>
    </Notes>
    <CVE>CVE-2016-2047</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.30-16.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.30-16.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2047.html</URL>
        <Description>CVE-2016-2047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963806</URL>
        <Description>SUSE Bug 963806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
