<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mariadb</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:3025-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-06T11:45:42Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-06T11:45:42Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-06T11:45:42Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mariadb</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This mariadb update to version 10.0.28 fixes the following issues (bsc#1008318):

Security fixes:
- CVE-2016-8283: Unspecified vulnerability in subcomponent Types (bsc#1005582)
- CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption (bsc#1005581)
- CVE-2016-5629: Unspecified vulnerability in subcomponent Federated (bsc#1005569)
- CVE-2016-5626: Unspecified vulnerability in subcomponent GIS (bsc#1005566)
- CVE-2016-5624: Unspecified vulnerability in subcomponent DML (bsc#1005564)
- CVE-2016-5616: Unspecified vulnerability in subcomponent MyISAM (bsc#1005562)
- CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption (bsc#1005558)
- CVE-2016-3492: Unspecified vulnerability in subcomponent Optimizer (bsc#1005555)
- CVE-2016-6663: Privilege Escalation / Race Condition (bsc#1001367)

Bugfixes:
- mariadb failing test sys_vars.optimizer_switch_basic (bsc#1003800)
- Remove useless mysql@default.service (bsc#1004477)
- Replace all occurrences of the string '@sysconfdir@' with '/etc' as it wasn't expanded properly (bsc#990890)
- Notable changes:
  * XtraDB updated to 5.6.33-79.0
  * TokuDB updated to 5.6.33-79.0
  * Innodb updated to 5.6.33
  * Performance Schema updated to 5.6.33
- Release notes and upstream changelog:
  * https://kb.askmonty.org/en/mariadb-10028-release-notes
  * https://kb.askmonty.org/en/mariadb-10028-changelog

This update was imported from the SUSE:SLE-12-SP1:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:3025-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient-devel-10.0.28-15.1">
      <FullProductName ProductID="libmysqlclient-devel-10.0.28-15.1">libmysqlclient-devel-10.0.28-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-10.0.28-15.1">
      <FullProductName ProductID="libmysqlclient18-10.0.28-15.1">libmysqlclient18-10.0.28-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-32bit-10.0.28-15.1">
      <FullProductName ProductID="libmysqlclient18-32bit-10.0.28-15.1">libmysqlclient18-32bit-10.0.28-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient_r18-10.0.28-15.1">
      <FullProductName ProductID="libmysqlclient_r18-10.0.28-15.1">libmysqlclient_r18-10.0.28-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient_r18-32bit-10.0.28-15.1">
      <FullProductName ProductID="libmysqlclient_r18-32bit-10.0.28-15.1">libmysqlclient_r18-32bit-10.0.28-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld-devel-10.0.28-15.1">
      <FullProductName ProductID="libmysqld-devel-10.0.28-15.1">libmysqld-devel-10.0.28-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld18-10.0.28-15.1">
      <FullProductName ProductID="libmysqld18-10.0.28-15.1">libmysqld18-10.0.28-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-10.0.28-15.1">
      <FullProductName ProductID="mariadb-10.0.28-15.1">mariadb-10.0.28-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-bench-10.0.28-15.1">
      <FullProductName ProductID="mariadb-bench-10.0.28-15.1">mariadb-bench-10.0.28-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-client-10.0.28-15.1">
      <FullProductName ProductID="mariadb-client-10.0.28-15.1">mariadb-client-10.0.28-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-errormessages-10.0.28-15.1">
      <FullProductName ProductID="mariadb-errormessages-10.0.28-15.1">mariadb-errormessages-10.0.28-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-test-10.0.28-15.1">
      <FullProductName ProductID="mariadb-test-10.0.28-15.1">mariadb-test-10.0.28-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-tools-10.0.28-15.1">
      <FullProductName ProductID="mariadb-tools-10.0.28-15.1">mariadb-tools-10.0.28-15.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysqlclient-devel-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysqlclient-devel-10.0.28-15.1">libmysqlclient-devel-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysqlclient18-10.0.28-15.1">libmysqlclient18-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-32bit-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysqlclient18-32bit-10.0.28-15.1">libmysqlclient18-32bit-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient_r18-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysqlclient_r18-10.0.28-15.1">libmysqlclient_r18-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient_r18-32bit-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysqlclient_r18-32bit-10.0.28-15.1">libmysqlclient_r18-32bit-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqld-devel-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysqld-devel-10.0.28-15.1">libmysqld-devel-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqld18-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libmysqld18-10.0.28-15.1">libmysqld18-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mariadb-10.0.28-15.1">mariadb-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-bench-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mariadb-bench-10.0.28-15.1">mariadb-bench-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-client-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mariadb-client-10.0.28-15.1">mariadb-client-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-errormessages-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mariadb-errormessages-10.0.28-15.1">mariadb-errormessages-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-test-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mariadb-test-10.0.28-15.1">mariadb-test-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-tools-10.0.28-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:mariadb-tools-10.0.28-15.1">mariadb-tools-10.0.28-15.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-3492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysqlclient-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-bench-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-client-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-errormessages-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-test-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-tools-10.0.28-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3492.html</URL>
        <Description>CVE-2016-3492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005555</URL>
        <Description>SUSE Bug 1005555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.</Note>
    </Notes>
    <CVE>CVE-2016-5584</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysqlclient-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-bench-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-client-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-errormessages-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-test-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-tools-10.0.28-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5584.html</URL>
        <Description>CVE-2016-5584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005558</URL>
        <Description>SUSE Bug 1005558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-6663. Reason:  This candidate is a reservation duplicate of CVE-2016-6663.  Notes: All CVE users should reference CVE-2016-6663 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2016-5616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysqlclient-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-bench-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-client-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-errormessages-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-test-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-tools-10.0.28-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5616.html</URL>
        <Description>CVE-2016-5616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001367</URL>
        <Description>SUSE Bug 1001367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005555</URL>
        <Description>SUSE Bug 1005555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005557</URL>
        <Description>SUSE Bug 1005557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005561</URL>
        <Description>SUSE Bug 1005561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005562</URL>
        <Description>SUSE Bug 1005562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005563</URL>
        <Description>SUSE Bug 1005563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005564</URL>
        <Description>SUSE Bug 1005564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005566</URL>
        <Description>SUSE Bug 1005566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005569</URL>
        <Description>SUSE Bug 1005569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005570</URL>
        <Description>SUSE Bug 1005570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005582</URL>
        <Description>SUSE Bug 1005582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008253</URL>
        <Description>SUSE Bug 1008253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020875</URL>
        <Description>SUSE Bug 1020875</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020876</URL>
        <Description>SUSE Bug 1020876</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020877</URL>
        <Description>SUSE Bug 1020877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020878</URL>
        <Description>SUSE Bug 1020878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020882</URL>
        <Description>SUSE Bug 1020882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020883</URL>
        <Description>SUSE Bug 1020883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020884</URL>
        <Description>SUSE Bug 1020884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020885</URL>
        <Description>SUSE Bug 1020885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020888</URL>
        <Description>SUSE Bug 1020888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020890</URL>
        <Description>SUSE Bug 1020890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020891</URL>
        <Description>SUSE Bug 1020891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020893</URL>
        <Description>SUSE Bug 1020893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020894</URL>
        <Description>SUSE Bug 1020894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020896</URL>
        <Description>SUSE Bug 1020896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020898</URL>
        <Description>SUSE Bug 1020898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020901</URL>
        <Description>SUSE Bug 1020901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022428</URL>
        <Description>SUSE Bug 1022428</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029014</URL>
        <Description>SUSE Bug 1029014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029396</URL>
        <Description>SUSE Bug 1029396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049393</URL>
        <Description>SUSE Bug 1049393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049394</URL>
        <Description>SUSE Bug 1049394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049396</URL>
        <Description>SUSE Bug 1049396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049399</URL>
        <Description>SUSE Bug 1049399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049400</URL>
        <Description>SUSE Bug 1049400</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049401</URL>
        <Description>SUSE Bug 1049401</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049402</URL>
        <Description>SUSE Bug 1049402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049403</URL>
        <Description>SUSE Bug 1049403</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049404</URL>
        <Description>SUSE Bug 1049404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049405</URL>
        <Description>SUSE Bug 1049405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049406</URL>
        <Description>SUSE Bug 1049406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049407</URL>
        <Description>SUSE Bug 1049407</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049408</URL>
        <Description>SUSE Bug 1049408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049409</URL>
        <Description>SUSE Bug 1049409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049410</URL>
        <Description>SUSE Bug 1049410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049411</URL>
        <Description>SUSE Bug 1049411</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049412</URL>
        <Description>SUSE Bug 1049412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049414</URL>
        <Description>SUSE Bug 1049414</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049415</URL>
        <Description>SUSE Bug 1049415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049416</URL>
        <Description>SUSE Bug 1049416</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049417</URL>
        <Description>SUSE Bug 1049417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064101</URL>
        <Description>SUSE Bug 1064101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064107</URL>
        <Description>SUSE Bug 1064107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064115</URL>
        <Description>SUSE Bug 1064115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064116</URL>
        <Description>SUSE Bug 1064116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064117</URL>
        <Description>SUSE Bug 1064117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998309</URL>
        <Description>SUSE Bug 998309</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-5624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysqlclient-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-bench-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-client-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-errormessages-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-test-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-tools-10.0.28-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5624.html</URL>
        <Description>CVE-2016-5624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005564</URL>
        <Description>SUSE Bug 1005564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.</Note>
    </Notes>
    <CVE>CVE-2016-5626</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysqlclient-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-bench-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-client-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-errormessages-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-test-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-tools-10.0.28-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5626.html</URL>
        <Description>CVE-2016-5626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005566</URL>
        <Description>SUSE Bug 1005566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.</Note>
    </Notes>
    <CVE>CVE-2016-5629</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysqlclient-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-bench-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-client-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-errormessages-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-test-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-tools-10.0.28-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5629.html</URL>
        <Description>CVE-2016-5629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005569</URL>
        <Description>SUSE Bug 1005569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.</Note>
    </Notes>
    <CVE>CVE-2016-6663</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysqlclient-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-bench-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-client-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-errormessages-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-test-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-tools-10.0.28-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6663.html</URL>
        <Description>CVE-2016-6663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001367</URL>
        <Description>SUSE Bug 1001367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008253</URL>
        <Description>SUSE Bug 1008253</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021755</URL>
        <Description>SUSE Bug 1021755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998309</URL>
        <Description>SUSE Bug 998309</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.</Note>
    </Notes>
    <CVE>CVE-2016-7440</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysqlclient-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-bench-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-client-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-errormessages-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-test-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-tools-10.0.28-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7440.html</URL>
        <Description>CVE-2016-7440</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005581</URL>
        <Description>SUSE Bug 1005581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Types.</Note>
    </Notes>
    <CVE>CVE-2016-8283</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libmysqlclient-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqlclient_r18-32bit-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld-devel-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libmysqld18-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-bench-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-client-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-errormessages-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-test-10.0.28-15.1</ProductID>
        <ProductID>openSUSE Leap 42.2:mariadb-tools-10.0.28-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8283.html</URL>
        <Description>CVE-2016-8283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005582</URL>
        <Description>SUSE Bug 1005582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
