<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mariadb</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:1619-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-06-17T14:57:05Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-06-17T14:57:05Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-06-17T14:57:05Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mariadb</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">mariadb was updated to version 10.0.25 to fix 25 security issues.

These security issues were fixed:
- CVE-2016-0505: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Options (bsc#980904).
- CVE-2016-0546: Unspecified vulnerability allowed local users to affect confidentiality, integrity, and availability via unknown vectors related to Client (bsc#980904).
- CVE-2016-0596: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0597: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904).
- CVE-2016-0598: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0600: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to InnoDB (bsc#980904).
- CVE-2016-0606: Unspecified vulnerability allowed remote authenticated users to affect integrity via unknown vectors related to encryption (bsc#980904).
- CVE-2016-0608: Unspecified vulnerability allowed remote authenticated users to affect availability via vectors related to UDF (bsc#980904).
- CVE-2016-0609: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to privileges (bsc#980904).
- CVE-2016-0616: Unspecified vulnerability allowed remote authenticated users to affect availability via unknown vectors related to Optimizer (bsc#980904).
- CVE-2016-0640: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to DML (bsc#980904).
- CVE-2016-0641: Unspecified vulnerability allowed local users to affect confidentiality and availability via vectors related to MyISAM (bsc#980904).
- CVE-2016-0642: Unspecified vulnerability allowed local users to affect integrity and availability via vectors related to Federated (bsc#980904).
- CVE-2016-0643: Unspecified vulnerability allowed local users to affect confidentiality via vectors related to DML (bsc#980904).
- CVE-2016-0644: Unspecified vulnerability allowed local users to affect availability via vectors related to DDL (bsc#980904).
- CVE-2016-0646: Unspecified vulnerability allowed local users to affect availability via vectors related to DML (bsc#980904).
- CVE-2016-0647: Unspecified vulnerability allowed local users to affect availability via vectors related to FTS (bsc#980904).
- CVE-2016-0648: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904).
- CVE-2016-0649: Unspecified vulnerability allowed local users to affect availability via vectors related to PS (bsc#980904).
- CVE-2016-0650: Unspecified vulnerability allowed local users to affect availability via vectors related to Replication (bsc#980904).
- CVE-2016-0651: Unspecified vulnerability allowed local users to affect availability via vectors related to Optimizer (bsc#980904).
- CVE-2016-0655: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904).
- CVE-2016-0666: Unspecified vulnerability allowed local users to affect availability via vectors related to Security: Privileges (bsc#980904).
- CVE-2016-0668: Unspecified vulnerability allowed local users to affect availability via vectors related to InnoDB (bsc#980904).
- CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c did not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allowed man-in-the-middle attackers to spoof SSL servers via a '/CN=' string in a field in a certificate, as demonstrated by '/OU=/CN=bar.com/CN=foo.com (bsc#963806).

These non-security issues were fixed:
- bsc#960961: Use 'plugin-load-add' instead of 'plugin-load' in default_plugins.cnf. It contained 'plugin-load' options which
  caused that only last plugin was actually loaded ('plugin-load' overrides the previous 'plugin-load') 
- bsc#961935: Remove the leftovers of 'openSUSE' string in the '-DWITH_COMMENT' and 'DCOMPILATION_COMMENT' options 
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-DESKTOP-12-2016-964,SUSE-SLE-SDK-12-2016-964,SUSE-SLE-SERVER-12-2016-964,SUSE-SLE-WE-12-2016-964</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      <Description>Link for SUSE-SU-2016:1619-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:1619-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/960961</URL>
      <Description>SUSE Bug 960961</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/961935</URL>
      <Description>SUSE Bug 961935</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/963806</URL>
      <Description>SUSE Bug 963806</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/980904</URL>
      <Description>SUSE Bug 980904</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0505/</URL>
      <Description>SUSE CVE CVE-2016-0505 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0546/</URL>
      <Description>SUSE CVE CVE-2016-0546 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0596/</URL>
      <Description>SUSE CVE CVE-2016-0596 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0597/</URL>
      <Description>SUSE CVE CVE-2016-0597 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0598/</URL>
      <Description>SUSE CVE CVE-2016-0598 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0600/</URL>
      <Description>SUSE CVE CVE-2016-0600 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0606/</URL>
      <Description>SUSE CVE CVE-2016-0606 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0608/</URL>
      <Description>SUSE CVE CVE-2016-0608 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0609/</URL>
      <Description>SUSE CVE CVE-2016-0609 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0616/</URL>
      <Description>SUSE CVE CVE-2016-0616 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0640/</URL>
      <Description>SUSE CVE CVE-2016-0640 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0641/</URL>
      <Description>SUSE CVE CVE-2016-0641 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0642/</URL>
      <Description>SUSE CVE CVE-2016-0642 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0643/</URL>
      <Description>SUSE CVE CVE-2016-0643 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0644/</URL>
      <Description>SUSE CVE CVE-2016-0644 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0646/</URL>
      <Description>SUSE CVE CVE-2016-0646 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0647/</URL>
      <Description>SUSE CVE CVE-2016-0647 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0648/</URL>
      <Description>SUSE CVE CVE-2016-0648 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0649/</URL>
      <Description>SUSE CVE CVE-2016-0649 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0650/</URL>
      <Description>SUSE CVE CVE-2016-0650 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0651/</URL>
      <Description>SUSE CVE CVE-2016-0651 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0655/</URL>
      <Description>SUSE CVE CVE-2016-0655 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0666/</URL>
      <Description>SUSE CVE CVE-2016-0666 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0668/</URL>
      <Description>SUSE CVE CVE-2016-0668 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2047/</URL>
      <Description>SUSE CVE CVE-2016-2047 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12" CPE="cpe:/o:suse:sled:12">SUSE Linux Enterprise Desktop 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12" CPE="cpe:/o:suse:sles:12">SUSE Linux Enterprise Server 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12" CPE="cpe:/o:suse:sle-sdk:12">SUSE Linux Enterprise Software Development Kit 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Workstation Extension 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Workstation Extension 12">
        <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12" CPE="cpe:/o:suse:sle-we:12">SUSE Linux Enterprise Workstation Extension 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-10.0.25-20.6.1">
      <FullProductName ProductID="libmysqlclient18-10.0.25-20.6.1">libmysqlclient18-10.0.25-20.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-32bit-10.0.25-20.6.1">
      <FullProductName ProductID="libmysqlclient18-32bit-10.0.25-20.6.1">libmysqlclient18-32bit-10.0.25-20.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient_r18-10.0.25-20.6.1">
      <FullProductName ProductID="libmysqlclient_r18-10.0.25-20.6.1">libmysqlclient_r18-10.0.25-20.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient_r18-32bit-10.0.25-20.6.1">
      <FullProductName ProductID="libmysqlclient_r18-32bit-10.0.25-20.6.1">libmysqlclient_r18-32bit-10.0.25-20.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-10.0.25-20.6.1">
      <FullProductName ProductID="mariadb-10.0.25-20.6.1">mariadb-10.0.25-20.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-client-10.0.25-20.6.1">
      <FullProductName ProductID="mariadb-client-10.0.25-20.6.1">mariadb-client-10.0.25-20.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-errormessages-10.0.25-20.6.1">
      <FullProductName ProductID="mariadb-errormessages-10.0.25-20.6.1">mariadb-errormessages-10.0.25-20.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient-devel-10.0.25-20.6.1">
      <FullProductName ProductID="libmysqlclient-devel-10.0.25-20.6.1">libmysqlclient-devel-10.0.25-20.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld-devel-10.0.25-20.6.1">
      <FullProductName ProductID="libmysqld-devel-10.0.25-20.6.1">libmysqld-devel-10.0.25-20.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld18-10.0.25-20.6.1">
      <FullProductName ProductID="libmysqld18-10.0.25-20.6.1">libmysqld18-10.0.25-20.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-tools-10.0.25-20.6.1">
      <FullProductName ProductID="mariadb-tools-10.0.25-20.6.1">mariadb-tools-10.0.25-20.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmysqlclient18-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1">libmysqlclient18-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-32bit-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1">libmysqlclient18-32bit-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient_r18-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1">libmysqlclient_r18-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient_r18-32bit-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1">libmysqlclient_r18-32bit-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1">mariadb-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-client-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1">mariadb-client-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-errormessages-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1">mariadb-errormessages-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Desktop 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1">libmysqlclient18-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-32bit-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1">libmysqlclient18-32bit-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1">mariadb-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-client-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1">mariadb-client-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-errormessages-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1">mariadb-errormessages-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-tools-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1">mariadb-tools-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1">libmysqlclient18-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient18-32bit-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1">libmysqlclient18-32bit-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1">mariadb-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-client-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1">mariadb-client-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-errormessages-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1">mariadb-errormessages-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="mariadb-tools-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1">mariadb-tools-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient-devel-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1">libmysqlclient-devel-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Software Development Kit 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient_r18-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1">libmysqlclient_r18-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Software Development Kit 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqld-devel-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1">libmysqld-devel-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Software Development Kit 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqld18-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1">libmysqld18-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Software Development Kit 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient_r18-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 12">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1">libmysqlclient_r18-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Workstation Extension 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmysqlclient_r18-32bit-10.0.25-20.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 12">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1">libmysqlclient_r18-32bit-10.0.25-20.6.1 as a component of SUSE Linux Enterprise Workstation Extension 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.</Note>
    </Notes>
    <CVE>CVE-2016-0505</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0505.html</URL>
        <Description>CVE-2016-0505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.</Note>
    </Notes>
    <CVE>CVE-2016-0546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0546.html</URL>
        <Description>CVE-2016-0546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0596</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0596.html</URL>
        <Description>CVE-2016-0596</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-0597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0597.html</URL>
        <Description>CVE-2016-0597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0598.html</URL>
        <Description>CVE-2016-0598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-0600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0600.html</URL>
        <Description>CVE-2016-0600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.</Note>
    </Notes>
    <CVE>CVE-2016-0606</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0606.html</URL>
        <Description>CVE-2016-0606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.</Note>
    </Notes>
    <CVE>CVE-2016-0608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0608.html</URL>
        <Description>CVE-2016-0608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.</Note>
    </Notes>
    <CVE>CVE-2016-0609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:N/AC:H/Au:M/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0609.html</URL>
        <Description>CVE-2016-0609</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-0616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0616.html</URL>
        <Description>CVE-2016-0616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962779</URL>
        <Description>SUSE Bug 962779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962817</URL>
        <Description>SUSE Bug 962817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962930</URL>
        <Description>SUSE Bug 962930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962931</URL>
        <Description>SUSE Bug 962931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962932</URL>
        <Description>SUSE Bug 962932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962934</URL>
        <Description>SUSE Bug 962934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962935</URL>
        <Description>SUSE Bug 962935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962936</URL>
        <Description>SUSE Bug 962936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962937</URL>
        <Description>SUSE Bug 962937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962938</URL>
        <Description>SUSE Bug 962938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962939</URL>
        <Description>SUSE Bug 962939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962941</URL>
        <Description>SUSE Bug 962941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962942</URL>
        <Description>SUSE Bug 962942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962943</URL>
        <Description>SUSE Bug 962943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962944</URL>
        <Description>SUSE Bug 962944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962945</URL>
        <Description>SUSE Bug 962945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962946</URL>
        <Description>SUSE Bug 962946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962947</URL>
        <Description>SUSE Bug 962947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962948</URL>
        <Description>SUSE Bug 962948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962949</URL>
        <Description>SUSE Bug 962949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962950</URL>
        <Description>SUSE Bug 962950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962951</URL>
        <Description>SUSE Bug 962951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962952</URL>
        <Description>SUSE Bug 962952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0640.html</URL>
        <Description>CVE-2016-0640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.</Note>
    </Notes>
    <CVE>CVE-2016-0641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:L/AC:L/Au:M/C:P/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0641.html</URL>
        <Description>CVE-2016-0641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.</Note>
    </Notes>
    <CVE>CVE-2016-0642</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:H/Au:M/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0642.html</URL>
        <Description>CVE-2016-0642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0643</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0643.html</URL>
        <Description>CVE-2016-0643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DDL.</Note>
    </Notes>
    <CVE>CVE-2016-0644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0644.html</URL>
        <Description>CVE-2016-0644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DML.</Note>
    </Notes>
    <CVE>CVE-2016-0646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0646.html</URL>
        <Description>CVE-2016-0646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.</Note>
    </Notes>
    <CVE>CVE-2016-0647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0647.html</URL>
        <Description>CVE-2016-0647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to PS.</Note>
    </Notes>
    <CVE>CVE-2016-0648</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0648.html</URL>
        <Description>CVE-2016-0648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.</Note>
    </Notes>
    <CVE>CVE-2016-0649</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0649.html</URL>
        <Description>CVE-2016-0649</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to Replication.</Note>
    </Notes>
    <CVE>CVE-2016-0650</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0650.html</URL>
        <Description>CVE-2016-0650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.</Note>
    </Notes>
    <CVE>CVE-2016-0651</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0651.html</URL>
        <Description>CVE-2016-0651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-0655</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0655.html</URL>
        <Description>CVE-2016-0655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to Security: Privileges.</Note>
    </Notes>
    <CVE>CVE-2016-0666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0666.html</URL>
        <Description>CVE-2016-0666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier and MariaDB 10.0.x before 10.0.24 and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to InnoDB.</Note>
    </Notes>
    <CVE>CVE-2016-0668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.7</BaseScore>
        <Vector>AV:L/AC:H/Au:M/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0668.html</URL>
        <Description>CVE-2016-0668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."</Note>
    </Notes>
    <CVE>CVE-2016-2047</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libmysqlclient18-32bit-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-client-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-errormessages-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:mariadb-tools-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld-devel-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:libmysqld18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-10.0.25-20.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12:libmysqlclient_r18-32bit-10.0.25-20.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20161619-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2047.html</URL>
        <Description>CVE-2016-2047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963806</URL>
        <Description>SUSE Bug 963806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980904</URL>
        <Description>SUSE Bug 980904</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
