<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libmysqlclient-devel-10.0.22-3.8 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10153-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libmysqlclient-devel-10.0.22-3.8 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libmysqlclient-devel-10.0.22-3.8 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10153</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-5970/</URL>
      <Description>SUSE CVE CVE-2007-5970 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-7247/</URL>
      <Description>SUSE CVE CVE-2008-7247 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4019/</URL>
      <Description>SUSE CVE CVE-2009-4019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4028/</URL>
      <Description>SUSE CVE CVE-2009-4028 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4030/</URL>
      <Description>SUSE CVE CVE-2009-4030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4414/</URL>
      <Description>SUSE CVE CVE-2012-4414 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5611/</URL>
      <Description>SUSE CVE CVE-2012-5611 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5612/</URL>
      <Description>SUSE CVE CVE-2012-5612 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5615/</URL>
      <Description>SUSE CVE CVE-2012-5615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5627/</URL>
      <Description>SUSE CVE CVE-2012-5627 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1976/</URL>
      <Description>SUSE CVE CVE-2013-1976 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4792/</URL>
      <Description>SUSE CVE CVE-2015-4792 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4802/</URL>
      <Description>SUSE CVE CVE-2015-4802 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4807/</URL>
      <Description>SUSE CVE CVE-2015-4807 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4815/</URL>
      <Description>SUSE CVE CVE-2015-4815 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4826/</URL>
      <Description>SUSE CVE CVE-2015-4826 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4830/</URL>
      <Description>SUSE CVE CVE-2015-4830 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4836/</URL>
      <Description>SUSE CVE CVE-2015-4836 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4858/</URL>
      <Description>SUSE CVE CVE-2015-4858 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4861/</URL>
      <Description>SUSE CVE CVE-2015-4861 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4870/</URL>
      <Description>SUSE CVE CVE-2015-4870 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4913/</URL>
      <Description>SUSE CVE CVE-2015-4913 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5969/</URL>
      <Description>SUSE CVE CVE-2015-5969 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient-devel-10.0.22-3.8">
      <FullProductName ProductID="libmysqlclient-devel-10.0.22-3.8">libmysqlclient-devel-10.0.22-3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-10.0.22-3.8">
      <FullProductName ProductID="libmysqlclient18-10.0.22-3.8">libmysqlclient18-10.0.22-3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-32bit-10.0.22-3.8">
      <FullProductName ProductID="libmysqlclient18-32bit-10.0.22-3.8">libmysqlclient18-32bit-10.0.22-3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient_r18-10.0.22-3.8">
      <FullProductName ProductID="libmysqlclient_r18-10.0.22-3.8">libmysqlclient_r18-10.0.22-3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient_r18-32bit-10.0.22-3.8">
      <FullProductName ProductID="libmysqlclient_r18-32bit-10.0.22-3.8">libmysqlclient_r18-32bit-10.0.22-3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld-devel-10.0.22-3.8">
      <FullProductName ProductID="libmysqld-devel-10.0.22-3.8">libmysqld-devel-10.0.22-3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld18-10.0.22-3.8">
      <FullProductName ProductID="libmysqld18-10.0.22-3.8">libmysqld18-10.0.22-3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-10.0.22-3.8">
      <FullProductName ProductID="mariadb-10.0.22-3.8">mariadb-10.0.22-3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-bench-10.0.22-3.8">
      <FullProductName ProductID="mariadb-bench-10.0.22-3.8">mariadb-bench-10.0.22-3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-client-10.0.22-3.8">
      <FullProductName ProductID="mariadb-client-10.0.22-3.8">mariadb-client-10.0.22-3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-errormessages-10.0.22-3.8">
      <FullProductName ProductID="mariadb-errormessages-10.0.22-3.8">mariadb-errormessages-10.0.22-3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-test-10.0.22-3.8">
      <FullProductName ProductID="mariadb-test-10.0.22-3.8">mariadb-test-10.0.22-3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-tools-10.0.22-3.8">
      <FullProductName ProductID="mariadb-tools-10.0.22-3.8">mariadb-tools-10.0.22-3.8</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysqlclient-devel-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8">libmysqlclient-devel-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8">libmysqlclient18-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-32bit-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8">libmysqlclient18-32bit-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient_r18-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8">libmysqlclient_r18-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient_r18-32bit-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8">libmysqlclient_r18-32bit-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqld-devel-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8">libmysqld-devel-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqld18-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmysqld18-10.0.22-3.8">libmysqld18-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-10.0.22-3.8">mariadb-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-bench-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8">mariadb-bench-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-client-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-client-10.0.22-3.8">mariadb-client-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-errormessages-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8">mariadb-errormessages-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-test-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-test-10.0.22-3.8">mariadb-test-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-tools-10.0.22-3.8" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8">mariadb-tools-10.0.22-3.8 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MySQL 5.1.x before 5.1.23 and 6.0.x before 6.0.4 allows remote authenticated users to gain privileges on arbitrary tables via unspecified vectors involving use of table-level DATA DIRECTORY and INDEX DIRECTORY options when creating a partitioned table with the same name as a table on which the user lacks privileges.</Note>
    </Notes>
    <CVE>CVE-2007-5970</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-5970.html</URL>
        <Description>CVE-2007-5970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/348307</URL>
        <Description>SUSE Bug 348307</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.</Note>
    </Notes>
    <CVE>CVE-2008-7247</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-7247.html</URL>
        <Description>CVE-2008-7247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/557669</URL>
        <Description>SUSE Bug 557669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/604528</URL>
        <Description>SUSE Bug 604528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.</Note>
    </Notes>
    <CVE>CVE-2009-4019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4019.html</URL>
        <Description>CVE-2009-4019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/557669</URL>
        <Description>SUSE Bug 557669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/604528</URL>
        <Description>SUSE Bug 604528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.</Note>
    </Notes>
    <CVE>CVE-2009-4028</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4028.html</URL>
        <Description>CVE-2009-4028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/557669</URL>
        <Description>SUSE Bug 557669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/604528</URL>
        <Description>SUSE Bug 604528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.</Note>
    </Notes>
    <CVE>CVE-2009-4030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4030.html</URL>
        <Description>CVE-2009-4030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/557669</URL>
        <Description>SUSE Bug 557669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/604528</URL>
        <Description>SUSE Bug 604528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log. NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete.</Note>
    </Notes>
    <CVE>CVE-2012-4414</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4414.html</URL>
        <Description>CVE-2012-4414</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/779476</URL>
        <Description>SUSE Bug 779476</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command.</Note>
    </Notes>
    <CVE>CVE-2012-5611</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5611.html</URL>
        <Description>CVE-2012-5611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792362</URL>
        <Description>SUSE Bug 792362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792444</URL>
        <Description>SUSE Bug 792444</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/798753</URL>
        <Description>SUSE Bug 798753</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.</Note>
    </Notes>
    <CVE>CVE-2012-5612</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5612.html</URL>
        <Description>CVE-2012-5612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792443</URL>
        <Description>SUSE Bug 792443</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/798753</URL>
        <Description>SUSE Bug 798753</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.</Note>
    </Notes>
    <CVE>CVE-2012-5615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5615.html</URL>
        <Description>CVE-2012-5615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792440</URL>
        <Description>SUSE Bug 792440</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901237</URL>
        <Description>SUSE Bug 901237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915913</URL>
        <Description>SUSE Bug 915913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Oracle MySQL and MariaDB 5.5.x before 5.5.29, 5.3.x before 5.3.12, and 5.2.x before 5.2.14 does not modify the salt during multiple executions of the change_user command within the same connection which makes it easier for remote authenticated users to conduct brute force password guessing attacks.</Note>
    </Notes>
    <CVE>CVE-2012-5627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5627.html</URL>
        <Description>CVE-2012-5627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792679</URL>
        <Description>SUSE Bug 792679</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.</Note>
    </Notes>
    <CVE>CVE-2013-1976</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1976.html</URL>
        <Description>CVE-2013-1976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/822177</URL>
        <Description>SUSE Bug 822177</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.</Note>
    </Notes>
    <CVE>CVE-2015-4792</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:N/AC:H/Au:M/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4792.html</URL>
        <Description>CVE-2015-4792</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.</Note>
    </Notes>
    <CVE>CVE-2015-4802</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4802.html</URL>
        <Description>CVE-2015-4802</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier, when running on Windows, allows remote authenticated users to affect availability via unknown vectors related to Server : Query Cache.</Note>
    </Notes>
    <CVE>CVE-2015-4807</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4807.html</URL>
        <Description>CVE-2015-4807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.</Note>
    </Notes>
    <CVE>CVE-2015-4815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4815.html</URL>
        <Description>CVE-2015-4815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.</Note>
    </Notes>
    <CVE>CVE-2015-4826</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4826.html</URL>
        <Description>CVE-2015-4826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.</Note>
    </Notes>
    <CVE>CVE-2015-4830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4830.html</URL>
        <Description>CVE-2015-4830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.</Note>
    </Notes>
    <CVE>CVE-2015-4836</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.8</BaseScore>
        <Vector>AV:N/AC:M/Au:M/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4836.html</URL>
        <Description>CVE-2015-4836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.</Note>
    </Notes>
    <CVE>CVE-2015-4858</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4858.html</URL>
        <Description>CVE-2015-4858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.</Note>
    </Notes>
    <CVE>CVE-2015-4861</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4861.html</URL>
        <Description>CVE-2015-4861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.</Note>
    </Notes>
    <CVE>CVE-2015-4870</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4870.html</URL>
        <Description>CVE-2015-4870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.</Note>
    </Notes>
    <CVE>CVE-2015-4913</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4913.html</URL>
        <Description>CVE-2015-4913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mysql-systemd-helper script in the mysql-community-server package before 5.6.28-2.17.1 in openSUSE 13.2 and before 5.6.28-13.1 in openSUSE Leap 42.1 and the mariadb package before 10.0.22-2.21.2 in openSUSE 13.2 and before 10.0.22-3.1 in SUSE Linux Enterprise (SLE) 12.1 and openSUSE Leap 42.1 allows local users to discover database credentials by listing a process and its arguments.</Note>
    </Notes>
    <CVE>CVE-2015-5969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysqlclient-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqlclient_r18-32bit-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld-devel-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysqld18-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-bench-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-client-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-errormessages-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-test-10.0.22-3.8</ProductID>
        <ProductID>openSUSE Tumbleweed:mariadb-tools-10.0.22-3.8</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5969.html</URL>
        <Description>CVE-2015-5969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957174</URL>
        <Description>SUSE Bug 957174</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
