<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libmysql56client18-32bit-5.6.34-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10200</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libmysql56client18-32bit-5.6.34-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libmysql56client18-32bit-5.6.34-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10200</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10200</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-5970/</URL>
      <Description>SUSE CVE CVE-2007-5970 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-7247/</URL>
      <Description>SUSE CVE CVE-2008-7247 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4019/</URL>
      <Description>SUSE CVE CVE-2009-4019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4028/</URL>
      <Description>SUSE CVE CVE-2009-4028 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4030/</URL>
      <Description>SUSE CVE CVE-2009-4030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1976/</URL>
      <Description>SUSE CVE CVE-2013-1976 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0286/</URL>
      <Description>SUSE CVE CVE-2015-0286 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0288/</URL>
      <Description>SUSE CVE CVE-2015-0288 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1789/</URL>
      <Description>SUSE CVE CVE-2015-1789 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1793/</URL>
      <Description>SUSE CVE CVE-2015-1793 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2582/</URL>
      <Description>SUSE CVE CVE-2015-2582 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2611/</URL>
      <Description>SUSE CVE CVE-2015-2611 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2617/</URL>
      <Description>SUSE CVE CVE-2015-2617 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2620/</URL>
      <Description>SUSE CVE CVE-2015-2620 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2639/</URL>
      <Description>SUSE CVE CVE-2015-2639 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2641/</URL>
      <Description>SUSE CVE CVE-2015-2641 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2643/</URL>
      <Description>SUSE CVE CVE-2015-2643 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2648/</URL>
      <Description>SUSE CVE CVE-2015-2648 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2661/</URL>
      <Description>SUSE CVE CVE-2015-2661 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3152/</URL>
      <Description>SUSE CVE CVE-2015-3152 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3194/</URL>
      <Description>SUSE CVE CVE-2015-3194 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4730/</URL>
      <Description>SUSE CVE CVE-2015-4730 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4737/</URL>
      <Description>SUSE CVE CVE-2015-4737 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4752/</URL>
      <Description>SUSE CVE CVE-2015-4752 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4756/</URL>
      <Description>SUSE CVE CVE-2015-4756 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4757/</URL>
      <Description>SUSE CVE CVE-2015-4757 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4761/</URL>
      <Description>SUSE CVE CVE-2015-4761 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4766/</URL>
      <Description>SUSE CVE CVE-2015-4766 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4767/</URL>
      <Description>SUSE CVE CVE-2015-4767 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4769/</URL>
      <Description>SUSE CVE CVE-2015-4769 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4771/</URL>
      <Description>SUSE CVE CVE-2015-4771 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4772/</URL>
      <Description>SUSE CVE CVE-2015-4772 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4792/</URL>
      <Description>SUSE CVE CVE-2015-4792 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4800/</URL>
      <Description>SUSE CVE CVE-2015-4800 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4802/</URL>
      <Description>SUSE CVE CVE-2015-4802 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4815/</URL>
      <Description>SUSE CVE CVE-2015-4815 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4816/</URL>
      <Description>SUSE CVE CVE-2015-4816 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4819/</URL>
      <Description>SUSE CVE CVE-2015-4819 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4826/</URL>
      <Description>SUSE CVE CVE-2015-4826 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4830/</URL>
      <Description>SUSE CVE CVE-2015-4830 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4833/</URL>
      <Description>SUSE CVE CVE-2015-4833 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4836/</URL>
      <Description>SUSE CVE CVE-2015-4836 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4858/</URL>
      <Description>SUSE CVE CVE-2015-4858 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4861/</URL>
      <Description>SUSE CVE CVE-2015-4861 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4862/</URL>
      <Description>SUSE CVE CVE-2015-4862 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4864/</URL>
      <Description>SUSE CVE CVE-2015-4864 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4866/</URL>
      <Description>SUSE CVE CVE-2015-4866 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4870/</URL>
      <Description>SUSE CVE CVE-2015-4870 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4879/</URL>
      <Description>SUSE CVE CVE-2015-4879 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4890/</URL>
      <Description>SUSE CVE CVE-2015-4890 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4895/</URL>
      <Description>SUSE CVE CVE-2015-4895 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4904/</URL>
      <Description>SUSE CVE CVE-2015-4904 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4905/</URL>
      <Description>SUSE CVE CVE-2015-4905 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4910/</URL>
      <Description>SUSE CVE CVE-2015-4910 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4913/</URL>
      <Description>SUSE CVE CVE-2015-4913 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5969/</URL>
      <Description>SUSE CVE CVE-2015-5969 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7744/</URL>
      <Description>SUSE CVE CVE-2015-7744 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0502/</URL>
      <Description>SUSE CVE CVE-2016-0502 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0503/</URL>
      <Description>SUSE CVE CVE-2016-0503 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0504/</URL>
      <Description>SUSE CVE CVE-2016-0504 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0505/</URL>
      <Description>SUSE CVE CVE-2016-0505 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0546/</URL>
      <Description>SUSE CVE CVE-2016-0546 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0594/</URL>
      <Description>SUSE CVE CVE-2016-0594 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0595/</URL>
      <Description>SUSE CVE CVE-2016-0595 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0596/</URL>
      <Description>SUSE CVE CVE-2016-0596 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0597/</URL>
      <Description>SUSE CVE CVE-2016-0597 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0598/</URL>
      <Description>SUSE CVE CVE-2016-0598 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0600/</URL>
      <Description>SUSE CVE CVE-2016-0600 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0605/</URL>
      <Description>SUSE CVE CVE-2016-0605 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0606/</URL>
      <Description>SUSE CVE CVE-2016-0606 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0607/</URL>
      <Description>SUSE CVE CVE-2016-0607 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0608/</URL>
      <Description>SUSE CVE CVE-2016-0608 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0609/</URL>
      <Description>SUSE CVE CVE-2016-0609 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0610/</URL>
      <Description>SUSE CVE CVE-2016-0610 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0611/</URL>
      <Description>SUSE CVE CVE-2016-0611 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0639/</URL>
      <Description>SUSE CVE CVE-2016-0639 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0640/</URL>
      <Description>SUSE CVE CVE-2016-0640 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0641/</URL>
      <Description>SUSE CVE CVE-2016-0641 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0642/</URL>
      <Description>SUSE CVE CVE-2016-0642 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0643/</URL>
      <Description>SUSE CVE CVE-2016-0643 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0644/</URL>
      <Description>SUSE CVE CVE-2016-0644 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0646/</URL>
      <Description>SUSE CVE CVE-2016-0646 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0647/</URL>
      <Description>SUSE CVE CVE-2016-0647 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0648/</URL>
      <Description>SUSE CVE CVE-2016-0648 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0649/</URL>
      <Description>SUSE CVE CVE-2016-0649 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0650/</URL>
      <Description>SUSE CVE CVE-2016-0650 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0655/</URL>
      <Description>SUSE CVE CVE-2016-0655 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0661/</URL>
      <Description>SUSE CVE CVE-2016-0661 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0665/</URL>
      <Description>SUSE CVE CVE-2016-0665 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0666/</URL>
      <Description>SUSE CVE CVE-2016-0666 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0668/</URL>
      <Description>SUSE CVE CVE-2016-0668 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0705/</URL>
      <Description>SUSE CVE CVE-2016-0705 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2047/</URL>
      <Description>SUSE CVE CVE-2016-2047 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2105/</URL>
      <Description>SUSE CVE CVE-2016-2105 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3459/</URL>
      <Description>SUSE CVE CVE-2016-3459 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3477/</URL>
      <Description>SUSE CVE CVE-2016-3477 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3486/</URL>
      <Description>SUSE CVE CVE-2016-3486 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3492/</URL>
      <Description>SUSE CVE CVE-2016-3492 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3501/</URL>
      <Description>SUSE CVE CVE-2016-3501 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3521/</URL>
      <Description>SUSE CVE CVE-2016-3521 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3614/</URL>
      <Description>SUSE CVE CVE-2016-3614 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3615/</URL>
      <Description>SUSE CVE CVE-2016-3615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5439/</URL>
      <Description>SUSE CVE CVE-2016-5439 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5440/</URL>
      <Description>SUSE CVE CVE-2016-5440 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5507/</URL>
      <Description>SUSE CVE CVE-2016-5507 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5584/</URL>
      <Description>SUSE CVE CVE-2016-5584 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5609/</URL>
      <Description>SUSE CVE CVE-2016-5609 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5612/</URL>
      <Description>SUSE CVE CVE-2016-5612 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5616/</URL>
      <Description>SUSE CVE CVE-2016-5616 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5617/</URL>
      <Description>SUSE CVE CVE-2016-5617 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5626/</URL>
      <Description>SUSE CVE CVE-2016-5626 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5627/</URL>
      <Description>SUSE CVE CVE-2016-5627 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5629/</URL>
      <Description>SUSE CVE CVE-2016-5629 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5630/</URL>
      <Description>SUSE CVE CVE-2016-5630 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6304/</URL>
      <Description>SUSE CVE CVE-2016-6304 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6662/</URL>
      <Description>SUSE CVE CVE-2016-6662 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7440/</URL>
      <Description>SUSE CVE CVE-2016-7440 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8283/</URL>
      <Description>SUSE CVE CVE-2016-8283 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8284/</URL>
      <Description>SUSE CVE CVE-2016-8284 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8288/</URL>
      <Description>SUSE CVE CVE-2016-8288 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-5.6.34-1.1">
      <FullProductName ProductID="libmysql56client18-5.6.34-1.1">libmysql56client18-5.6.34-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client18-32bit-5.6.34-1.1">
      <FullProductName ProductID="libmysql56client18-32bit-5.6.34-1.1">libmysql56client18-32bit-5.6.34-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-5.6.34-1.1">
      <FullProductName ProductID="libmysql56client_r18-5.6.34-1.1">libmysql56client_r18-5.6.34-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysql56client_r18-32bit-5.6.34-1.1">
      <FullProductName ProductID="libmysql56client_r18-32bit-5.6.34-1.1">libmysql56client_r18-32bit-5.6.34-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-5.6.34-1.1">
      <FullProductName ProductID="mysql-community-server-5.6.34-1.1">mysql-community-server-5.6.34-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-bench-5.6.34-1.1">
      <FullProductName ProductID="mysql-community-server-bench-5.6.34-1.1">mysql-community-server-bench-5.6.34-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-client-5.6.34-1.1">
      <FullProductName ProductID="mysql-community-server-client-5.6.34-1.1">mysql-community-server-client-5.6.34-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-errormessages-5.6.34-1.1">
      <FullProductName ProductID="mysql-community-server-errormessages-5.6.34-1.1">mysql-community-server-errormessages-5.6.34-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-test-5.6.34-1.1">
      <FullProductName ProductID="mysql-community-server-test-5.6.34-1.1">mysql-community-server-test-5.6.34-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mysql-community-server-tools-5.6.34-1.1">
      <FullProductName ProductID="mysql-community-server-tools-5.6.34-1.1">mysql-community-server-tools-5.6.34-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysql56client18-5.6.34-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1">libmysql56client18-5.6.34-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client18-32bit-5.6.34-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1">libmysql56client18-32bit-5.6.34-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-5.6.34-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1">libmysql56client_r18-5.6.34-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysql56client_r18-32bit-5.6.34-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1">libmysql56client_r18-32bit-5.6.34-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-5.6.34-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1">mysql-community-server-5.6.34-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-bench-5.6.34-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1">mysql-community-server-bench-5.6.34-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-client-5.6.34-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1">mysql-community-server-client-5.6.34-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-errormessages-5.6.34-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1">mysql-community-server-errormessages-5.6.34-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-test-5.6.34-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1">mysql-community-server-test-5.6.34-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mysql-community-server-tools-5.6.34-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1">mysql-community-server-tools-5.6.34-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MySQL 5.1.x before 5.1.23 and 6.0.x before 6.0.4 allows remote authenticated users to gain privileges on arbitrary tables via unspecified vectors involving use of table-level DATA DIRECTORY and INDEX DIRECTORY options when creating a partitioned table with the same name as a table on which the user lacks privileges.</Note>
    </Notes>
    <CVE>CVE-2007-5970</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-5970.html</URL>
        <Description>CVE-2007-5970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/348307</URL>
        <Description>SUSE Bug 348307</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.</Note>
    </Notes>
    <CVE>CVE-2008-7247</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-7247.html</URL>
        <Description>CVE-2008-7247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/557669</URL>
        <Description>SUSE Bug 557669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/604528</URL>
        <Description>SUSE Bug 604528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.</Note>
    </Notes>
    <CVE>CVE-2009-4019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4019.html</URL>
        <Description>CVE-2009-4019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/557669</URL>
        <Description>SUSE Bug 557669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/604528</URL>
        <Description>SUSE Bug 604528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.</Note>
    </Notes>
    <CVE>CVE-2009-4028</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4028.html</URL>
        <Description>CVE-2009-4028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/557669</URL>
        <Description>SUSE Bug 557669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/604528</URL>
        <Description>SUSE Bug 604528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.</Note>
    </Notes>
    <CVE>CVE-2009-4030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4030.html</URL>
        <Description>CVE-2009-4030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/557669</URL>
        <Description>SUSE Bug 557669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/604528</URL>
        <Description>SUSE Bug 604528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.</Note>
    </Notes>
    <CVE>CVE-2013-1976</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1976.html</URL>
        <Description>CVE-2013-1976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/822177</URL>
        <Description>SUSE Bug 822177</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.</Note>
    </Notes>
    <CVE>CVE-2015-0286</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0286.html</URL>
        <Description>CVE-2015-0286</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919648</URL>
        <Description>SUSE Bug 919648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922496</URL>
        <Description>SUSE Bug 922496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.</Note>
    </Notes>
    <CVE>CVE-2015-0288</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0288.html</URL>
        <Description>CVE-2015-0288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919648</URL>
        <Description>SUSE Bug 919648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920236</URL>
        <Description>SUSE Bug 920236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.</Note>
    </Notes>
    <CVE>CVE-2015-1789</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1789.html</URL>
        <Description>CVE-2015-1789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934489</URL>
        <Description>SUSE Bug 934489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934666</URL>
        <Description>SUSE Bug 934666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938432</URL>
        <Description>SUSE Bug 938432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.</Note>
    </Notes>
    <CVE>CVE-2015-1793</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1793.html</URL>
        <Description>CVE-2015-1793</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936746</URL>
        <Description>SUSE Bug 936746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937637</URL>
        <Description>SUSE Bug 937637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.</Note>
    </Notes>
    <CVE>CVE-2015-2582</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2582.html</URL>
        <Description>CVE-2015-2582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2015-2611</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2611.html</URL>
        <Description>CVE-2015-2611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Partition.</Note>
    </Notes>
    <CVE>CVE-2015-2617</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2617.html</URL>
        <Description>CVE-2015-2617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.</Note>
    </Notes>
    <CVE>CVE-2015-2620</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2620.html</URL>
        <Description>CVE-2015-2620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Firewall.</Note>
    </Notes>
    <CVE>CVE-2015-2639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2639.html</URL>
        <Description>CVE-2015-2639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Privileges.</Note>
    </Notes>
    <CVE>CVE-2015-2641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2641.html</URL>
        <Description>CVE-2015-2641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.</Note>
    </Notes>
    <CVE>CVE-2015-2643</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2643.html</URL>
        <Description>CVE-2015-2643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2015-2648</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2648.html</URL>
        <Description>CVE-2015-2648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows local users to affect availability via unknown vectors related to Client.</Note>
    </Notes>
    <CVE>CVE-2015-2661</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2661.html</URL>
        <Description>CVE-2015-2661</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.</Note>
    </Notes>
    <CVE>CVE-2015-3152</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3152.html</URL>
        <Description>CVE-2015-3152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037590</URL>
        <Description>SUSE Bug 1037590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1047059</URL>
        <Description>SUSE Bug 1047059</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088681</URL>
        <Description>SUSE Bug 1088681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924663</URL>
        <Description>SUSE Bug 924663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928962</URL>
        <Description>SUSE Bug 928962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936407</URL>
        <Description>SUSE Bug 936407</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.</Note>
    </Notes>
    <CVE>CVE-2015-3194</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3194.html</URL>
        <Description>CVE-2015-3194</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957812</URL>
        <Description>SUSE Bug 957812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957815</URL>
        <Description>SUSE Bug 957815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958768</URL>
        <Description>SUSE Bug 958768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990370</URL>
        <Description>SUSE Bug 990370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.20 and earlier allows remote authenticated users to affect availability via unknown vectors related to Types.</Note>
    </Notes>
    <CVE>CVE-2015-4730</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4730.html</URL>
        <Description>CVE-2015-4730</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Pluggable Auth.</Note>
    </Notes>
    <CVE>CVE-2015-4737</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4737.html</URL>
        <Description>CVE-2015-4737</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.</Note>
    </Notes>
    <CVE>CVE-2015-4752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4752.html</URL>
        <Description>CVE-2015-4752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB, a different vulnerability than CVE-2015-0439.</Note>
    </Notes>
    <CVE>CVE-2015-4756</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4756.html</URL>
        <Description>CVE-2015-4756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.</Note>
    </Notes>
    <CVE>CVE-2015-4757</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4757.html</URL>
        <Description>CVE-2015-4757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.</Note>
    </Notes>
    <CVE>CVE-2015-4761</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4761.html</URL>
        <Description>CVE-2015-4761</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows local users to affect availability via unknown vectors related to Server : Security : Firewall.</Note>
    </Notes>
    <CVE>CVE-2015-4766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4766.html</URL>
        <Description>CVE-2015-4766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Firewall, a different vulnerability than CVE-2015-4769.</Note>
    </Notes>
    <CVE>CVE-2015-4767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4767.html</URL>
        <Description>CVE-2015-4767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Firewall, a different vulnerability than CVE-2015-4767.</Note>
    </Notes>
    <CVE>CVE-2015-4769</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4769.html</URL>
        <Description>CVE-2015-4769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to RBR.</Note>
    </Notes>
    <CVE>CVE-2015-4771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4771.html</URL>
        <Description>CVE-2015-4771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.</Note>
    </Notes>
    <CVE>CVE-2015-4772</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4772.html</URL>
        <Description>CVE-2015-4772</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938412</URL>
        <Description>SUSE Bug 938412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.</Note>
    </Notes>
    <CVE>CVE-2015-4792</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4792.html</URL>
        <Description>CVE-2015-4792</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.</Note>
    </Notes>
    <CVE>CVE-2015-4800</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4800.html</URL>
        <Description>CVE-2015-4800</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.</Note>
    </Notes>
    <CVE>CVE-2015-4802</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4802.html</URL>
        <Description>CVE-2015-4802</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.</Note>
    </Notes>
    <CVE>CVE-2015-4815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4815.html</URL>
        <Description>CVE-2015-4815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.</Note>
    </Notes>
    <CVE>CVE-2015-4816</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4816.html</URL>
        <Description>CVE-2015-4816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958790</URL>
        <Description>SUSE Bug 958790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.</Note>
    </Notes>
    <CVE>CVE-2015-4819</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4819.html</URL>
        <Description>CVE-2015-4819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958790</URL>
        <Description>SUSE Bug 958790</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969667</URL>
        <Description>SUSE Bug 969667</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.</Note>
    </Notes>
    <CVE>CVE-2015-4826</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4826.html</URL>
        <Description>CVE-2015-4826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.</Note>
    </Notes>
    <CVE>CVE-2015-4830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4830.html</URL>
        <Description>CVE-2015-4830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.</Note>
    </Notes>
    <CVE>CVE-2015-4833</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4833.html</URL>
        <Description>CVE-2015-4833</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.</Note>
    </Notes>
    <CVE>CVE-2015-4836</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4836.html</URL>
        <Description>CVE-2015-4836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.</Note>
    </Notes>
    <CVE>CVE-2015-4858</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4858.html</URL>
        <Description>CVE-2015-4858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.</Note>
    </Notes>
    <CVE>CVE-2015-4861</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4861.html</URL>
        <Description>CVE-2015-4861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2015-4862</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4862.html</URL>
        <Description>CVE-2015-4862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.</Note>
    </Notes>
    <CVE>CVE-2015-4864</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4864.html</URL>
        <Description>CVE-2015-4864</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.</Note>
    </Notes>
    <CVE>CVE-2015-4866</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4866.html</URL>
        <Description>CVE-2015-4866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.</Note>
    </Notes>
    <CVE>CVE-2015-4870</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4870.html</URL>
        <Description>CVE-2015-4870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2015-4879</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4879.html</URL>
        <Description>CVE-2015-4879</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958790</URL>
        <Description>SUSE Bug 958790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Replication.</Note>
    </Notes>
    <CVE>CVE-2015-4890</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4890.html</URL>
        <Description>CVE-2015-4890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.</Note>
    </Notes>
    <CVE>CVE-2015-4895</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4895.html</URL>
        <Description>CVE-2015-4895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958790</URL>
        <Description>SUSE Bug 958790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to libmysqld.</Note>
    </Notes>
    <CVE>CVE-2015-4904</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4904.html</URL>
        <Description>CVE-2015-4904</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML.</Note>
    </Notes>
    <CVE>CVE-2015-4905</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4905.html</URL>
        <Description>CVE-2015-4905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.</Note>
    </Notes>
    <CVE>CVE-2015-4910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4910.html</URL>
        <Description>CVE-2015-4910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.</Note>
    </Notes>
    <CVE>CVE-2015-4913</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4913.html</URL>
        <Description>CVE-2015-4913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958789</URL>
        <Description>SUSE Bug 958789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mysql-systemd-helper script in the mysql-community-server package before 5.6.28-2.17.1 in openSUSE 13.2 and before 5.6.28-13.1 in openSUSE Leap 42.1 and the mariadb package before 10.0.22-2.21.2 in openSUSE 13.2 and before 10.0.22-3.1 in SUSE Linux Enterprise (SLE) 12.1 and openSUSE Leap 42.1 allows local users to discover database credentials by listing a process and its arguments.</Note>
    </Notes>
    <CVE>CVE-2015-5969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5969.html</URL>
        <Description>CVE-2015-5969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957174</URL>
        <Description>SUSE Bug 957174</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.</Note>
    </Notes>
    <CVE>CVE-2015-7744</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7744.html</URL>
        <Description>CVE-2015-7744</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-0502</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0502.html</URL>
        <Description>CVE-2016-0502</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0504.</Note>
    </Notes>
    <CVE>CVE-2016-0503</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0503.html</URL>
        <Description>CVE-2016-0503</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0503.</Note>
    </Notes>
    <CVE>CVE-2016-0504</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0504.html</URL>
        <Description>CVE-2016-0504</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.</Note>
    </Notes>
    <CVE>CVE-2016-0505</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0505.html</URL>
        <Description>CVE-2016-0505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.</Note>
    </Notes>
    <CVE>CVE-2016-0546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0546.html</URL>
        <Description>CVE-2016-0546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.21 and earlier allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0594</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0594.html</URL>
        <Description>CVE-2016-0594</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0595</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0595.html</URL>
        <Description>CVE-2016-0595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0596</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0596.html</URL>
        <Description>CVE-2016-0596</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-0597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0597.html</URL>
        <Description>CVE-2016-0597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0598.html</URL>
        <Description>CVE-2016-0598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-0600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0600.html</URL>
        <Description>CVE-2016-0600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-0605</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0605.html</URL>
        <Description>CVE-2016-0605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.</Note>
    </Notes>
    <CVE>CVE-2016-0606</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0606.html</URL>
        <Description>CVE-2016-0606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to replication.</Note>
    </Notes>
    <CVE>CVE-2016-0607</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.8</BaseScore>
        <Vector>AV:N/AC:M/Au:M/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0607.html</URL>
        <Description>CVE-2016-0607</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.</Note>
    </Notes>
    <CVE>CVE-2016-0608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0608.html</URL>
        <Description>CVE-2016-0608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.</Note>
    </Notes>
    <CVE>CVE-2016-0609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:N/AC:H/Au:M/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0609.html</URL>
        <Description>CVE-2016-0609</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-0610</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0610.html</URL>
        <Description>CVE-2016-0610</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-0611</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0611.html</URL>
        <Description>CVE-2016-0611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Pluggable Authentication.</Note>
    </Notes>
    <CVE>CVE-2016-0639</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0639.html</URL>
        <Description>CVE-2016-0639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0640.html</URL>
        <Description>CVE-2016-0640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.</Note>
    </Notes>
    <CVE>CVE-2016-0641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:L/AC:L/Au:M/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0641.html</URL>
        <Description>CVE-2016-0641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.</Note>
    </Notes>
    <CVE>CVE-2016-0642</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:H/Au:M/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0642.html</URL>
        <Description>CVE-2016-0642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0643</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0643.html</URL>
        <Description>CVE-2016-0643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DDL.</Note>
    </Notes>
    <CVE>CVE-2016-0644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0644.html</URL>
        <Description>CVE-2016-0644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0646.html</URL>
        <Description>CVE-2016-0646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.</Note>
    </Notes>
    <CVE>CVE-2016-0647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0647.html</URL>
        <Description>CVE-2016-0647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to PS.</Note>
    </Notes>
    <CVE>CVE-2016-0648</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0648.html</URL>
        <Description>CVE-2016-0648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.</Note>
    </Notes>
    <CVE>CVE-2016-0649</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0649.html</URL>
        <Description>CVE-2016-0649</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to Replication.</Note>
    </Notes>
    <CVE>CVE-2016-0650</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0650.html</URL>
        <Description>CVE-2016-0650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-0655</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0655.html</URL>
        <Description>CVE-2016-0655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local users to affect availability via vectors related to Options.</Note>
    </Notes>
    <CVE>CVE-2016-0661</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0661.html</URL>
        <Description>CVE-2016-0661</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local users to affect availability via vectors related to Security: Encryption.</Note>
    </Notes>
    <CVE>CVE-2016-0665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0665.html</URL>
        <Description>CVE-2016-0665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to Security: Privileges.</Note>
    </Notes>
    <CVE>CVE-2016-0666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0666.html</URL>
        <Description>CVE-2016-0666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier and MariaDB 10.0.x before 10.0.24 and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-0668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:M/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0668.html</URL>
        <Description>CVE-2016-0668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.</Note>
    </Notes>
    <CVE>CVE-2016-0705</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0705.html</URL>
        <Description>CVE-2016-0705</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968044</URL>
        <Description>SUSE Bug 968044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968047</URL>
        <Description>SUSE Bug 968047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971238</URL>
        <Description>SUSE Bug 971238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."</Note>
    </Notes>
    <CVE>CVE-2016-2047</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2047.html</URL>
        <Description>CVE-2016-2047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963806</URL>
        <Description>SUSE Bug 963806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.</Note>
    </Notes>
    <CVE>CVE-2016-2105</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2105.html</URL>
        <Description>CVE-2016-2105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977584</URL>
        <Description>SUSE Bug 977584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977614</URL>
        <Description>SUSE Bug 977614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978492</URL>
        <Description>SUSE Bug 978492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989902</URL>
        <Description>SUSE Bug 989902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990369</URL>
        <Description>SUSE Bug 990369</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990370</URL>
        <Description>SUSE Bug 990370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows remote administrators to affect availability via vectors related to Server: InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-3459</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3459.html</URL>
        <Description>CVE-2016-3459</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989911</URL>
        <Description>SUSE Bug 989911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Parser.</Note>
    </Notes>
    <CVE>CVE-2016-3477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3477.html</URL>
        <Description>CVE-2016-3477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989913</URL>
        <Description>SUSE Bug 989913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991616</URL>
        <Description>SUSE Bug 991616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: FTS.</Note>
    </Notes>
    <CVE>CVE-2016-3486</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3486.html</URL>
        <Description>CVE-2016-3486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989914</URL>
        <Description>SUSE Bug 989914</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-3492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3492.html</URL>
        <Description>CVE-2016-3492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005555</URL>
        <Description>SUSE Bug 1005555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-3501</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3501.html</URL>
        <Description>CVE-2016-3501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989915</URL>
        <Description>SUSE Bug 989915</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: Types.</Note>
    </Notes>
    <CVE>CVE-2016-3521</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3521.html</URL>
        <Description>CVE-2016-3521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989919</URL>
        <Description>SUSE Bug 989919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991616</URL>
        <Description>SUSE Bug 991616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: Security: Encryption.</Note>
    </Notes>
    <CVE>CVE-2016-3614</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3614.html</URL>
        <Description>CVE-2016-3614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989921</URL>
        <Description>SUSE Bug 989921</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: DML.</Note>
    </Notes>
    <CVE>CVE-2016-3615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3615.html</URL>
        <Description>CVE-2016-3615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989922</URL>
        <Description>SUSE Bug 989922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991616</URL>
        <Description>SUSE Bug 991616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote administrators to affect availability via vectors related to Server: Privileges.</Note>
    </Notes>
    <CVE>CVE-2016-5439</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5439.html</URL>
        <Description>CVE-2016-5439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989925</URL>
        <Description>SUSE Bug 989925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote administrators to affect availability via vectors related to Server: RBR.</Note>
    </Notes>
    <CVE>CVE-2016-5440</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5440.html</URL>
        <Description>CVE-2016-5440</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989926</URL>
        <Description>SUSE Bug 989926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991616</URL>
        <Description>SUSE Bug 991616</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.32 and earlier and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-5507</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5507.html</URL>
        <Description>CVE-2016-5507</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005557</URL>
        <Description>SUSE Bug 1005557</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.</Note>
    </Notes>
    <CVE>CVE-2016-5584</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5584.html</URL>
        <Description>CVE-2016-5584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005558</URL>
        <Description>SUSE Bug 1005558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-5609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5609.html</URL>
        <Description>CVE-2016-5609</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005560</URL>
        <Description>SUSE Bug 1005560</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-5612</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5612.html</URL>
        <Description>CVE-2016-5612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005561</URL>
        <Description>SUSE Bug 1005561</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-6663. Reason:  This candidate is a reservation duplicate of CVE-2016-6663.  Notes: All CVE users should reference CVE-2016-6663 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2016-5616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5616.html</URL>
        <Description>CVE-2016-5616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005562</URL>
        <Description>SUSE Bug 1005562</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-6664.  Reason: This candidate is a reservation duplicate of CVE-2016-6664.  Notes: All CVE users should reference CVE-2016-6664 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2016-5617</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5617.html</URL>
        <Description>CVE-2016-5617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005563</URL>
        <Description>SUSE Bug 1005563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008253</URL>
        <Description>SUSE Bug 1008253</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.</Note>
    </Notes>
    <CVE>CVE-2016-5626</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5626.html</URL>
        <Description>CVE-2016-5626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005566</URL>
        <Description>SUSE Bug 1005566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to Server: InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-5627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5627.html</URL>
        <Description>CVE-2016-5627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005567</URL>
        <Description>SUSE Bug 1005567</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.</Note>
    </Notes>
    <CVE>CVE-2016-5629</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5629.html</URL>
        <Description>CVE-2016-5629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005569</URL>
        <Description>SUSE Bug 1005569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote administrators to affect availability via vectors related to Server: InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-5630</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5630.html</URL>
        <Description>CVE-2016-5630</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005570</URL>
        <Description>SUSE Bug 1005570</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.</Note>
    </Notes>
    <CVE>CVE-2016-6304</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6304.html</URL>
        <Description>CVE-2016-6304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001706</URL>
        <Description>SUSE Bug 1001706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003811</URL>
        <Description>SUSE Bug 1003811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004104</URL>
        <Description>SUSE Bug 1004104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005579</URL>
        <Description>SUSE Bug 1005579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021375</URL>
        <Description>SUSE Bug 1021375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999666</URL>
        <Description>SUSE Bug 999666</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.</Note>
    </Notes>
    <CVE>CVE-2016-6662</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6662.html</URL>
        <Description>CVE-2016-6662</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001367</URL>
        <Description>SUSE Bug 1001367</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005580</URL>
        <Description>SUSE Bug 1005580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020873</URL>
        <Description>SUSE Bug 1020873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020884</URL>
        <Description>SUSE Bug 1020884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021755</URL>
        <Description>SUSE Bug 1021755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998309</URL>
        <Description>SUSE Bug 998309</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.</Note>
    </Notes>
    <CVE>CVE-2016-7440</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7440.html</URL>
        <Description>CVE-2016-7440</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005581</URL>
        <Description>SUSE Bug 1005581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Types.</Note>
    </Notes>
    <CVE>CVE-2016-8283</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8283.html</URL>
        <Description>CVE-2016-8283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005582</URL>
        <Description>SUSE Bug 1005582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008318</URL>
        <Description>SUSE Bug 1008318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows local users to affect availability via vectors related to Server: Replication.</Note>
    </Notes>
    <CVE>CVE-2016-8284</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8284.html</URL>
        <Description>CVE-2016-8284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005583</URL>
        <Description>SUSE Bug 1005583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008117</URL>
        <Description>SUSE Bug 1008117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008133</URL>
        <Description>SUSE Bug 1008133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008141</URL>
        <Description>SUSE Bug 1008141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008150</URL>
        <Description>SUSE Bug 1008150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008151</URL>
        <Description>SUSE Bug 1008151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008152</URL>
        <Description>SUSE Bug 1008152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011266</URL>
        <Description>SUSE Bug 1011266</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011267</URL>
        <Description>SUSE Bug 1011267</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="120">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect integrity via vectors related to Server: InnoDB Plugin.</Note>
    </Notes>
    <CVE>CVE-2016-8288</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmysql56client18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-32bit-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmysql56client_r18-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-bench-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-client-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-errormessages-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-test-5.6.34-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mysql-community-server-tools-5.6.34-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8288.html</URL>
        <Description>CVE-2016-8288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005586</URL>
        <Description>SUSE Bug 1005586</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
