<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mysql-community-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2769-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-11-10T12:16:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-11-10T12:16:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-11-10T12:16:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mysql-community-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
mysql-community-server was updated to 5.6.34 to fix the following issues:

* Changes
  http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-34.html
  http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
  http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-32.html
  http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-31.html
* fixed CVEs:
  CVE-2016-6304, CVE-2016-6662, CVE-2016-7440, CVE-2016-5584,
  CVE-2016-5617, CVE-2016-5616, CVE-2016-5626, CVE-2016-3492,
  CVE-2016-5629, CVE-2016-5507, CVE-2016-8283, CVE-2016-5609,
  CVE-2016-5612, CVE-2016-5627, CVE-2016-5630, CVE-2016-8284,
  CVE-2016-8288, CVE-2016-3477, CVE-2016-2105, CVE-2016-3486,
  CVE-2016-3501, CVE-2016-3521, CVE-2016-3615, CVE-2016-3614,
  CVE-2016-3459, CVE-2016-5439, CVE-2016-5440
* fixes SUSE Bugs:
  [boo#999666],  [boo#998309],  [boo#1005581], [boo#1005558], 
  [boo#1005563], [boo#1005562], [boo#1005566], [boo#1005555], 
  [boo#1005569], [boo#1005557], [boo#1005582], [boo#1005560], 
  [boo#1005561], [boo#1005567], [boo#1005570], [boo#1005583], 
  [boo#1005586], [boo#989913],  [boo#977614],  [boo#989914], 
  [boo#989915],  [boo#989919],  [boo#989922],  [boo#989921], 
  [boo#989911],  [boo#989925],  [boo#989926]
- append '--ignore-db-dir=lost+found' to the mysqld options in
  'mysql-systemd-helper' script if 'lost+found' directory is found
  in $datadir [boo#986251]  
- remove syslog.target from *.service files [boo#983938]
- add systemd to deps to build on leap and friends  
- replace '%{_libexecdir}/systemd/system' with %{_unitdir} macro
- remove useless mysql@default.service [boo#971456]
- replace all occurrences of the string '@sysconfdir@' with '/etc' in
  mysql-community-server-5.6.3-logrotate.patch as it wasn't expanded
  properly [boo#990890]
- remove '%define _rundir' as 13.1 is out of support scope
- run 'usermod -g mysql mysql' only if mysql user is not in mysql group.
  Run 'usermod -s /bin/false/ mysql' only if mysql user doesn't have
  '/bin/false' shell set.
- re-enable mysql profiling

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2769-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-5.6.34-19.2">
      <FullProductName ProductID="libmysql56client18-5.6.34-19.2">libmysql56client18-5.6.34-19.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-32bit-5.6.34-19.2">
      <FullProductName ProductID="libmysql56client18-32bit-5.6.34-19.2">libmysql56client18-32bit-5.6.34-19.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-5.6.34-19.2">
      <FullProductName ProductID="libmysql56client_r18-5.6.34-19.2">libmysql56client_r18-5.6.34-19.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-32bit-5.6.34-19.2">
      <FullProductName ProductID="libmysql56client_r18-32bit-5.6.34-19.2">libmysql56client_r18-32bit-5.6.34-19.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-5.6.34-19.2">
      <FullProductName ProductID="mysql-community-server-5.6.34-19.2">mysql-community-server-5.6.34-19.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-bench-5.6.34-19.2">
      <FullProductName ProductID="mysql-community-server-bench-5.6.34-19.2">mysql-community-server-bench-5.6.34-19.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-client-5.6.34-19.2">
      <FullProductName ProductID="mysql-community-server-client-5.6.34-19.2">mysql-community-server-client-5.6.34-19.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-errormessages-5.6.34-19.2">
      <FullProductName ProductID="mysql-community-server-errormessages-5.6.34-19.2">mysql-community-server-errormessages-5.6.34-19.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-test-5.6.34-19.2">
      <FullProductName ProductID="mysql-community-server-test-5.6.34-19.2">mysql-community-server-test-5.6.34-19.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-tools-5.6.34-19.2">
      <FullProductName ProductID="mysql-community-server-tools-5.6.34-19.2">mysql-community-server-tools-5.6.34-19.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysql56client18-5.6.34-19.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2">libmysql56client18-5.6.34-19.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-32bit-5.6.34-19.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2">libmysql56client18-32bit-5.6.34-19.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-5.6.34-19.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2">libmysql56client_r18-5.6.34-19.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-32bit-5.6.34-19.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2">libmysql56client_r18-32bit-5.6.34-19.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-5.6.34-19.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2">mysql-community-server-5.6.34-19.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-bench-5.6.34-19.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2">mysql-community-server-bench-5.6.34-19.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-client-5.6.34-19.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2">mysql-community-server-client-5.6.34-19.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-errormessages-5.6.34-19.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2">mysql-community-server-errormessages-5.6.34-19.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-test-5.6.34-19.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2">mysql-community-server-test-5.6.34-19.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-tools-5.6.34-19.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2">mysql-community-server-tools-5.6.34-19.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.</Note>
    </Notes>
    <CVE>CVE-2016-2105</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2105.html</URL>
        <Description>CVE-2016-2105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977584</URL>
        <Description>SUSE Bug 977584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977614</URL>
        <Description>SUSE Bug 977614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978492</URL>
        <Description>SUSE Bug 978492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989902</URL>
        <Description>SUSE Bug 989902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990369</URL>
        <Description>SUSE Bug 990369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990370</URL>
        <Description>SUSE Bug 990370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows remote administrators to affect availability via vectors related to Server: InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-3459</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3459.html</URL>
        <Description>CVE-2016-3459</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989911</URL>
        <Description>SUSE Bug 989911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Parser.</Note>
    </Notes>
    <CVE>CVE-2016-3477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3477.html</URL>
        <Description>CVE-2016-3477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989913</URL>
        <Description>SUSE Bug 989913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991616</URL>
        <Description>SUSE Bug 991616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: FTS.</Note>
    </Notes>
    <CVE>CVE-2016-3486</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3486.html</URL>
        <Description>CVE-2016-3486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989914</URL>
        <Description>SUSE Bug 989914</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-3492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3492.html</URL>
        <Description>CVE-2016-3492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005555</URL>
        <Description>SUSE Bug 1005555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-3501</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3501.html</URL>
        <Description>CVE-2016-3501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989915</URL>
        <Description>SUSE Bug 989915</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: Types.</Note>
    </Notes>
    <CVE>CVE-2016-3521</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3521.html</URL>
        <Description>CVE-2016-3521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989919</URL>
        <Description>SUSE Bug 989919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991616</URL>
        <Description>SUSE Bug 991616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: Security: Encryption.</Note>
    </Notes>
    <CVE>CVE-2016-3614</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3614.html</URL>
        <Description>CVE-2016-3614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989921</URL>
        <Description>SUSE Bug 989921</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: DML.</Note>
    </Notes>
    <CVE>CVE-2016-3615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3615.html</URL>
        <Description>CVE-2016-3615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989922</URL>
        <Description>SUSE Bug 989922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991616</URL>
        <Description>SUSE Bug 991616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote administrators to affect availability via vectors related to Server: Privileges.</Note>
    </Notes>
    <CVE>CVE-2016-5439</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5439.html</URL>
        <Description>CVE-2016-5439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989925</URL>
        <Description>SUSE Bug 989925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote administrators to affect availability via vectors related to Server: RBR.</Note>
    </Notes>
    <CVE>CVE-2016-5440</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5440.html</URL>
        <Description>CVE-2016-5440</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989926</URL>
        <Description>SUSE Bug 989926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991616</URL>
        <Description>SUSE Bug 991616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.32 and earlier and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-5507</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5507.html</URL>
        <Description>CVE-2016-5507</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005557</URL>
        <Description>SUSE Bug 1005557</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.</Note>
    </Notes>
    <CVE>CVE-2016-5584</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5584.html</URL>
        <Description>CVE-2016-5584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005558</URL>
        <Description>SUSE Bug 1005558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-5609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5609.html</URL>
        <Description>CVE-2016-5609</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005560</URL>
        <Description>SUSE Bug 1005560</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-5612</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5612.html</URL>
        <Description>CVE-2016-5612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005561</URL>
        <Description>SUSE Bug 1005561</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-6663. Reason:  This candidate is a reservation duplicate of CVE-2016-6663.  Notes: All CVE users should reference CVE-2016-6663 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2016-5616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5616.html</URL>
        <Description>CVE-2016-5616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001367</URL>
        <Description>SUSE Bug 1001367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005555</URL>
        <Description>SUSE Bug 1005555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005557</URL>
        <Description>SUSE Bug 1005557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005561</URL>
        <Description>SUSE Bug 1005561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005562</URL>
        <Description>SUSE Bug 1005562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005563</URL>
        <Description>SUSE Bug 1005563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005564</URL>
        <Description>SUSE Bug 1005564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005566</URL>
        <Description>SUSE Bug 1005566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005569</URL>
        <Description>SUSE Bug 1005569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005570</URL>
        <Description>SUSE Bug 1005570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005582</URL>
        <Description>SUSE Bug 1005582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008253</URL>
        <Description>SUSE Bug 1008253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020875</URL>
        <Description>SUSE Bug 1020875</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020876</URL>
        <Description>SUSE Bug 1020876</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020877</URL>
        <Description>SUSE Bug 1020877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020878</URL>
        <Description>SUSE Bug 1020878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020882</URL>
        <Description>SUSE Bug 1020882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020883</URL>
        <Description>SUSE Bug 1020883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020884</URL>
        <Description>SUSE Bug 1020884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020885</URL>
        <Description>SUSE Bug 1020885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020888</URL>
        <Description>SUSE Bug 1020888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020890</URL>
        <Description>SUSE Bug 1020890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020891</URL>
        <Description>SUSE Bug 1020891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020893</URL>
        <Description>SUSE Bug 1020893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020894</URL>
        <Description>SUSE Bug 1020894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020896</URL>
        <Description>SUSE Bug 1020896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020898</URL>
        <Description>SUSE Bug 1020898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020901</URL>
        <Description>SUSE Bug 1020901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022428</URL>
        <Description>SUSE Bug 1022428</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029014</URL>
        <Description>SUSE Bug 1029014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029396</URL>
        <Description>SUSE Bug 1029396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049393</URL>
        <Description>SUSE Bug 1049393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049394</URL>
        <Description>SUSE Bug 1049394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049396</URL>
        <Description>SUSE Bug 1049396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049399</URL>
        <Description>SUSE Bug 1049399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049400</URL>
        <Description>SUSE Bug 1049400</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049401</URL>
        <Description>SUSE Bug 1049401</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049402</URL>
        <Description>SUSE Bug 1049402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049403</URL>
        <Description>SUSE Bug 1049403</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049404</URL>
        <Description>SUSE Bug 1049404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049405</URL>
        <Description>SUSE Bug 1049405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049406</URL>
        <Description>SUSE Bug 1049406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049407</URL>
        <Description>SUSE Bug 1049407</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049408</URL>
        <Description>SUSE Bug 1049408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049409</URL>
        <Description>SUSE Bug 1049409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049410</URL>
        <Description>SUSE Bug 1049410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049411</URL>
        <Description>SUSE Bug 1049411</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049412</URL>
        <Description>SUSE Bug 1049412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049414</URL>
        <Description>SUSE Bug 1049414</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049415</URL>
        <Description>SUSE Bug 1049415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049416</URL>
        <Description>SUSE Bug 1049416</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049417</URL>
        <Description>SUSE Bug 1049417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064101</URL>
        <Description>SUSE Bug 1064101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064107</URL>
        <Description>SUSE Bug 1064107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064115</URL>
        <Description>SUSE Bug 1064115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064116</URL>
        <Description>SUSE Bug 1064116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064117</URL>
        <Description>SUSE Bug 1064117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998309</URL>
        <Description>SUSE Bug 998309</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-6664.  Reason: This candidate is a reservation duplicate of CVE-2016-6664.  Notes: All CVE users should reference CVE-2016-6664 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2016-5617</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5617.html</URL>
        <Description>CVE-2016-5617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001367</URL>
        <Description>SUSE Bug 1001367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005555</URL>
        <Description>SUSE Bug 1005555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005557</URL>
        <Description>SUSE Bug 1005557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005561</URL>
        <Description>SUSE Bug 1005561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005562</URL>
        <Description>SUSE Bug 1005562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005563</URL>
        <Description>SUSE Bug 1005563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005564</URL>
        <Description>SUSE Bug 1005564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005566</URL>
        <Description>SUSE Bug 1005566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005569</URL>
        <Description>SUSE Bug 1005569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005570</URL>
        <Description>SUSE Bug 1005570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005582</URL>
        <Description>SUSE Bug 1005582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008253</URL>
        <Description>SUSE Bug 1008253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020873</URL>
        <Description>SUSE Bug 1020873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020875</URL>
        <Description>SUSE Bug 1020875</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020876</URL>
        <Description>SUSE Bug 1020876</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020877</URL>
        <Description>SUSE Bug 1020877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020878</URL>
        <Description>SUSE Bug 1020878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020882</URL>
        <Description>SUSE Bug 1020882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020883</URL>
        <Description>SUSE Bug 1020883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020884</URL>
        <Description>SUSE Bug 1020884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020885</URL>
        <Description>SUSE Bug 1020885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020888</URL>
        <Description>SUSE Bug 1020888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020890</URL>
        <Description>SUSE Bug 1020890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020891</URL>
        <Description>SUSE Bug 1020891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020893</URL>
        <Description>SUSE Bug 1020893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020894</URL>
        <Description>SUSE Bug 1020894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020896</URL>
        <Description>SUSE Bug 1020896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020898</URL>
        <Description>SUSE Bug 1020898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020901</URL>
        <Description>SUSE Bug 1020901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022428</URL>
        <Description>SUSE Bug 1022428</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029014</URL>
        <Description>SUSE Bug 1029014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029396</URL>
        <Description>SUSE Bug 1029396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049393</URL>
        <Description>SUSE Bug 1049393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049394</URL>
        <Description>SUSE Bug 1049394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049396</URL>
        <Description>SUSE Bug 1049396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049399</URL>
        <Description>SUSE Bug 1049399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049400</URL>
        <Description>SUSE Bug 1049400</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049401</URL>
        <Description>SUSE Bug 1049401</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049402</URL>
        <Description>SUSE Bug 1049402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049403</URL>
        <Description>SUSE Bug 1049403</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049404</URL>
        <Description>SUSE Bug 1049404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049405</URL>
        <Description>SUSE Bug 1049405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049406</URL>
        <Description>SUSE Bug 1049406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049407</URL>
        <Description>SUSE Bug 1049407</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049408</URL>
        <Description>SUSE Bug 1049408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049409</URL>
        <Description>SUSE Bug 1049409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049410</URL>
        <Description>SUSE Bug 1049410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049411</URL>
        <Description>SUSE Bug 1049411</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049412</URL>
        <Description>SUSE Bug 1049412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049414</URL>
        <Description>SUSE Bug 1049414</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049415</URL>
        <Description>SUSE Bug 1049415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049416</URL>
        <Description>SUSE Bug 1049416</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049417</URL>
        <Description>SUSE Bug 1049417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064101</URL>
        <Description>SUSE Bug 1064101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064107</URL>
        <Description>SUSE Bug 1064107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064115</URL>
        <Description>SUSE Bug 1064115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064116</URL>
        <Description>SUSE Bug 1064116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064117</URL>
        <Description>SUSE Bug 1064117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1101675</URL>
        <Description>SUSE Bug 1101675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998309</URL>
        <Description>SUSE Bug 998309</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.</Note>
    </Notes>
    <CVE>CVE-2016-5626</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5626.html</URL>
        <Description>CVE-2016-5626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005566</URL>
        <Description>SUSE Bug 1005566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to Server: InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-5627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5627.html</URL>
        <Description>CVE-2016-5627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005567</URL>
        <Description>SUSE Bug 1005567</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.</Note>
    </Notes>
    <CVE>CVE-2016-5629</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5629.html</URL>
        <Description>CVE-2016-5629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005569</URL>
        <Description>SUSE Bug 1005569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote administrators to affect availability via vectors related to Server: InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-5630</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5630.html</URL>
        <Description>CVE-2016-5630</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005570</URL>
        <Description>SUSE Bug 1005570</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.</Note>
    </Notes>
    <CVE>CVE-2016-6304</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6304.html</URL>
        <Description>CVE-2016-6304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001706</URL>
        <Description>SUSE Bug 1001706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003811</URL>
        <Description>SUSE Bug 1003811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005579</URL>
        <Description>SUSE Bug 1005579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021375</URL>
        <Description>SUSE Bug 1021375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999666</URL>
        <Description>SUSE Bug 999666</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.</Note>
    </Notes>
    <CVE>CVE-2016-6662</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6662.html</URL>
        <Description>CVE-2016-6662</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001367</URL>
        <Description>SUSE Bug 1001367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005580</URL>
        <Description>SUSE Bug 1005580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020873</URL>
        <Description>SUSE Bug 1020873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020884</URL>
        <Description>SUSE Bug 1020884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021755</URL>
        <Description>SUSE Bug 1021755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998309</URL>
        <Description>SUSE Bug 998309</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.</Note>
    </Notes>
    <CVE>CVE-2016-7440</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7440.html</URL>
        <Description>CVE-2016-7440</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005581</URL>
        <Description>SUSE Bug 1005581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Types.</Note>
    </Notes>
    <CVE>CVE-2016-8283</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8283.html</URL>
        <Description>CVE-2016-8283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005582</URL>
        <Description>SUSE Bug 1005582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows local users to affect availability via vectors related to Server: Replication.</Note>
    </Notes>
    <CVE>CVE-2016-8284</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8284.html</URL>
        <Description>CVE-2016-8284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005583</URL>
        <Description>SUSE Bug 1005583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008117</URL>
        <Description>SUSE Bug 1008117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008133</URL>
        <Description>SUSE Bug 1008133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008141</URL>
        <Description>SUSE Bug 1008141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008150</URL>
        <Description>SUSE Bug 1008150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008151</URL>
        <Description>SUSE Bug 1008151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008152</URL>
        <Description>SUSE Bug 1008152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011266</URL>
        <Description>SUSE Bug 1011266</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011267</URL>
        <Description>SUSE Bug 1011267</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect integrity via vectors related to Server: InnoDB Plugin.</Note>
    </Notes>
    <CVE>CVE-2016-8288</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libmysql56client18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-32bit-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libmysql56client_r18-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-bench-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-client-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-errormessages-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-test-5.6.34-19.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mysql-community-server-tools-5.6.34-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8288.html</URL>
        <Description>CVE-2016-8288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005586</URL>
        <Description>SUSE Bug 1005586</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
