<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mariadb</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1664-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-06-23T07:53:19Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-06-23T07:53:19Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-06-23T07:53:19Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mariadb</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">mariadb was updated to version 10.0.25 to fix 25 security issues.

These security issues were fixed:
- CVE-2016-0505: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Options (bsc#980904).
- CVE-2016-0546: Unspecified vulnerability allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Client (bsc#980904).
- CVE-2016-0596: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0597: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904).
- CVE-2016-0598: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0600: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to InnoDB (bsc#980904).
- CVE-2016-0606: Unspecified vulnerability allowed remote authenticated users to affect integrity via unknown vectors related to encryption (bsc#980904).
- CVE-2016-0608: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to UDF (bsc#980904).
- CVE-2016-0609: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to privileges (bsc#980904).
- CVE-2016-0616: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904).
- CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#980904).
- CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#980904).
- CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#980904).
- CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#980904).
- CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#980904).
- CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#980904).
- CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904).
- CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904).
- CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#980904).
- CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#980904).
- CVE-2016-0655: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904).
- CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#980904).
- CVE-2016-0668: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904).
- CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a &amp;quot;/CN=&amp;quot; string in a field in a certificate, as demonstrated by &amp;quot;/OU=/CN=bar.com/CN=foo.com (bsc#963806).

These non-security issues were fixed:
- bsc#970295: Fix the leftovers of &amp;quot;logrotate.d/mysql&amp;quot; string in the logrotate error message. Occurrences of this string were changed to &amp;quot;logrotate.d/mariadb&amp;quot;
- bsc#963810: Add 'log-error' and 'secure-file-priv' configuration options
  * add '/etc/my.cnf.d/error_log.conf' that specifies
    'log-error = /var/log/mysql/mysqld.log'. If no path is set,
    the error log is written to '/var/lib/mysql/$HOSTNAME.err',
    which is not picked up by logrotate.
  * add '/etc/my.cnf.d/secure_file_priv.conf' which specifies that
    'LOAD DATA', 'SELECT ... INTO' and 'LOAD FILE()' will only work
    with files in the directory specified by 'secure-file-priv'
    option (='/var/lib/mysql-files').
- Temporarily disable OQGraph. It seems to need the boost library with
  the version not earlier than 1.40 and not later than 1.55 (MDEV-9479)
- boo#979524: Don't remove HandlerSocket plugin 
- boo#970287: Add &amp;quot;BuildRequires: jemalloc-devel&amp;quot; in order to allow enabling of the TokuDB plugin 
- run 'usermod -g mysql mysql' only if mysql user is not in mysql group.
  Run 'usermod -s /bin/false/ mysql' only if mysql user doesn't have
  '/bin/false' shell set.
- Re-enable profiling support  
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1664-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient-devel-10.0.25-2.24.1">
      <FullProductName ProductID="libmysqlclient-devel-10.0.25-2.24.1">libmysqlclient-devel-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-10.0.25-2.24.1">
      <FullProductName ProductID="libmysqlclient18-10.0.25-2.24.1">libmysqlclient18-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-32bit-10.0.25-2.24.1">
      <FullProductName ProductID="libmysqlclient18-32bit-10.0.25-2.24.1">libmysqlclient18-32bit-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-debuginfo-10.0.25-2.24.1">
      <FullProductName ProductID="libmysqlclient18-debuginfo-10.0.25-2.24.1">libmysqlclient18-debuginfo-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1">
      <FullProductName ProductID="libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1">libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient_r18-10.0.25-2.24.1">
      <FullProductName ProductID="libmysqlclient_r18-10.0.25-2.24.1">libmysqlclient_r18-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient_r18-32bit-10.0.25-2.24.1">
      <FullProductName ProductID="libmysqlclient_r18-32bit-10.0.25-2.24.1">libmysqlclient_r18-32bit-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld-devel-10.0.25-2.24.1">
      <FullProductName ProductID="libmysqld-devel-10.0.25-2.24.1">libmysqld-devel-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld18-10.0.25-2.24.1">
      <FullProductName ProductID="libmysqld18-10.0.25-2.24.1">libmysqld18-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld18-debuginfo-10.0.25-2.24.1">
      <FullProductName ProductID="libmysqld18-debuginfo-10.0.25-2.24.1">libmysqld18-debuginfo-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-10.0.25-2.24.1">
      <FullProductName ProductID="mariadb-10.0.25-2.24.1">mariadb-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-bench-10.0.25-2.24.1">
      <FullProductName ProductID="mariadb-bench-10.0.25-2.24.1">mariadb-bench-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-bench-debuginfo-10.0.25-2.24.1">
      <FullProductName ProductID="mariadb-bench-debuginfo-10.0.25-2.24.1">mariadb-bench-debuginfo-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-client-10.0.25-2.24.1">
      <FullProductName ProductID="mariadb-client-10.0.25-2.24.1">mariadb-client-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-client-debuginfo-10.0.25-2.24.1">
      <FullProductName ProductID="mariadb-client-debuginfo-10.0.25-2.24.1">mariadb-client-debuginfo-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-debuginfo-10.0.25-2.24.1">
      <FullProductName ProductID="mariadb-debuginfo-10.0.25-2.24.1">mariadb-debuginfo-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-debugsource-10.0.25-2.24.1">
      <FullProductName ProductID="mariadb-debugsource-10.0.25-2.24.1">mariadb-debugsource-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-errormessages-10.0.25-2.24.1">
      <FullProductName ProductID="mariadb-errormessages-10.0.25-2.24.1">mariadb-errormessages-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-test-10.0.25-2.24.1">
      <FullProductName ProductID="mariadb-test-10.0.25-2.24.1">mariadb-test-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-test-debuginfo-10.0.25-2.24.1">
      <FullProductName ProductID="mariadb-test-debuginfo-10.0.25-2.24.1">mariadb-test-debuginfo-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-tools-10.0.25-2.24.1">
      <FullProductName ProductID="mariadb-tools-10.0.25-2.24.1">mariadb-tools-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-tools-debuginfo-10.0.25-2.24.1">
      <FullProductName ProductID="mariadb-tools-debuginfo-10.0.25-2.24.1">mariadb-tools-debuginfo-10.0.25-2.24.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysqlclient-devel-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1">libmysqlclient-devel-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1">libmysqlclient18-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-32bit-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1">libmysqlclient18-32bit-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-debuginfo-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1">libmysqlclient18-debuginfo-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1">libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient_r18-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1">libmysqlclient_r18-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient_r18-32bit-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1">libmysqlclient_r18-32bit-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqld-devel-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1">libmysqld-devel-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqld18-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libmysqld18-10.0.25-2.24.1">libmysqld18-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqld18-debuginfo-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1">libmysqld18-debuginfo-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:mariadb-10.0.25-2.24.1">mariadb-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-bench-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:mariadb-bench-10.0.25-2.24.1">mariadb-bench-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-bench-debuginfo-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1">mariadb-bench-debuginfo-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-client-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:mariadb-client-10.0.25-2.24.1">mariadb-client-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-client-debuginfo-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1">mariadb-client-debuginfo-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-debuginfo-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1">mariadb-debuginfo-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-debugsource-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1">mariadb-debugsource-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-errormessages-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1">mariadb-errormessages-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-test-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:mariadb-test-10.0.25-2.24.1">mariadb-test-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-test-debuginfo-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1">mariadb-test-debuginfo-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-tools-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:mariadb-tools-10.0.25-2.24.1">mariadb-tools-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-tools-debuginfo-10.0.25-2.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1">mariadb-tools-debuginfo-10.0.25-2.24.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.</Note>
    </Notes>
    <CVE>CVE-2016-0505</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0505.html</URL>
        <Description>CVE-2016-0505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.</Note>
    </Notes>
    <CVE>CVE-2016-0546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0546.html</URL>
        <Description>CVE-2016-0546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0596</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0596.html</URL>
        <Description>CVE-2016-0596</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-0597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0597.html</URL>
        <Description>CVE-2016-0597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0598.html</URL>
        <Description>CVE-2016-0598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-0600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0600.html</URL>
        <Description>CVE-2016-0600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.</Note>
    </Notes>
    <CVE>CVE-2016-0606</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0606.html</URL>
        <Description>CVE-2016-0606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.</Note>
    </Notes>
    <CVE>CVE-2016-0608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0608.html</URL>
        <Description>CVE-2016-0608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.</Note>
    </Notes>
    <CVE>CVE-2016-0609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0609.html</URL>
        <Description>CVE-2016-0609</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-0616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0616.html</URL>
        <Description>CVE-2016-0616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0640.html</URL>
        <Description>CVE-2016-0640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.</Note>
    </Notes>
    <CVE>CVE-2016-0641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:M/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0641.html</URL>
        <Description>CVE-2016-0641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.</Note>
    </Notes>
    <CVE>CVE-2016-0642</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:H/Au:M/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0642.html</URL>
        <Description>CVE-2016-0642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0643</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0643.html</URL>
        <Description>CVE-2016-0643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DDL.</Note>
    </Notes>
    <CVE>CVE-2016-0644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.5</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0644.html</URL>
        <Description>CVE-2016-0644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.5</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0646.html</URL>
        <Description>CVE-2016-0646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.</Note>
    </Notes>
    <CVE>CVE-2016-0647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0647.html</URL>
        <Description>CVE-2016-0647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to PS.</Note>
    </Notes>
    <CVE>CVE-2016-0648</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.5</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0648.html</URL>
        <Description>CVE-2016-0648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.</Note>
    </Notes>
    <CVE>CVE-2016-0649</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.5</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0649.html</URL>
        <Description>CVE-2016-0649</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to Replication.</Note>
    </Notes>
    <CVE>CVE-2016-0650</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.5</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0650.html</URL>
        <Description>CVE-2016-0650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-0651</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.5</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0651.html</URL>
        <Description>CVE-2016-0651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-0655</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.0</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0655.html</URL>
        <Description>CVE-2016-0655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to Security: Privileges.</Note>
    </Notes>
    <CVE>CVE-2016-0666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.5</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0666.html</URL>
        <Description>CVE-2016-0666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier and MariaDB 10.0.x before 10.0.24 and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-0668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:H/Au:M/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0668.html</URL>
        <Description>CVE-2016-0668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."</Note>
    </Notes>
    <CVE>CVE-2016-2047</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libmysqlclient-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient18-debuginfo-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqlclient_r18-32bit-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld-devel-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:libmysqld18-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-bench-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-client-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-debugsource-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-errormessages-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-test-debuginfo-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-10.0.25-2.24.1</ProductID>
        <ProductID>openSUSE 13.2:mariadb-tools-debuginfo-10.0.25-2.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2047.html</URL>
        <Description>CVE-2016-2047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963806</URL>
        <Description>SUSE Bug 963806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
