<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MariaDB</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:1216-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-07-01T07:00:16Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-07-01T07:00:16Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-07-01T07:00:16Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MariaDB</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
MariaDB was updated to its current minor version, fixing bugs and security issues.

These updates include a fix for Logjam (CVE-2015-4000), making MariaDB work
with client software that no longer allows short DH groups over SSL, as e.g.
our current openssl packages.

On openSUSE 13.1, MariaDB was updated to 5.5.44.

On openSUSE 13.2, MariaDB was updated from 10.0.13 to 10.0.20.

Please read the release notes of MariaDB
  https://mariadb.com/kb/en/mariadb/mariadb-10020-release-notes/
  https://mariadb.com/kb/en/mariadb/mariadb-10019-release-notes/
  https://mariadb.com/kb/en/mariadb/mariadb-10018-release-notes/
  https://mariadb.com/kb/en/mariadb/mariadb-10017-release-notes/
  https://mariadb.com/kb/en/mariadb/mariadb-10016-release-notes/
  https://mariadb.com/kb/en/mariadb/mariadb-10015-release-notes/
  https://mariadb.com/kb/en/mariadb/mariadb-10014-release-notes/
for more information.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:1216-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="libmysqlclient-devel-5.5.44-4.1">
      <FullProductName ProductID="libmysqlclient-devel-5.5.44-4.1">libmysqlclient-devel-5.5.44-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-5.5.44-4.1">
      <FullProductName ProductID="libmysqlclient18-5.5.44-4.1">libmysqlclient18-5.5.44-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient18-32bit-5.5.44-4.1">
      <FullProductName ProductID="libmysqlclient18-32bit-5.5.44-4.1">libmysqlclient18-32bit-5.5.44-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient_r18-5.5.44-4.1">
      <FullProductName ProductID="libmysqlclient_r18-5.5.44-4.1">libmysqlclient_r18-5.5.44-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqlclient_r18-32bit-5.5.44-4.1">
      <FullProductName ProductID="libmysqlclient_r18-32bit-5.5.44-4.1">libmysqlclient_r18-32bit-5.5.44-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld-devel-5.5.44-4.1">
      <FullProductName ProductID="libmysqld-devel-5.5.44-4.1">libmysqld-devel-5.5.44-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmysqld18-5.5.44-4.1">
      <FullProductName ProductID="libmysqld18-5.5.44-4.1">libmysqld18-5.5.44-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-5.5.44-4.1">
      <FullProductName ProductID="mariadb-5.5.44-4.1">mariadb-5.5.44-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-bench-5.5.44-4.1">
      <FullProductName ProductID="mariadb-bench-5.5.44-4.1">mariadb-bench-5.5.44-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-client-5.5.44-4.1">
      <FullProductName ProductID="mariadb-client-5.5.44-4.1">mariadb-client-5.5.44-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-errormessages-5.5.44-4.1">
      <FullProductName ProductID="mariadb-errormessages-5.5.44-4.1">mariadb-errormessages-5.5.44-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-test-5.5.44-4.1">
      <FullProductName ProductID="mariadb-test-5.5.44-4.1">mariadb-test-5.5.44-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mariadb-tools-5.5.44-4.1">
      <FullProductName ProductID="mariadb-tools-5.5.44-4.1">mariadb-tools-5.5.44-4.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.</Note>
    </Notes>
    <CVE>CVE-2014-6464</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6464.html</URL>
        <Description>CVE-2014-6464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901237</URL>
        <Description>SUSE Bug 901237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915912</URL>
        <Description>SUSE Bug 915912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.</Note>
    </Notes>
    <CVE>CVE-2014-6469</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6469.html</URL>
        <Description>CVE-2014-6469</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901237</URL>
        <Description>SUSE Bug 901237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915912</URL>
        <Description>SUSE Bug 915912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.</Note>
    </Notes>
    <CVE>CVE-2014-6491</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6491.html</URL>
        <Description>CVE-2014-6491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901237</URL>
        <Description>SUSE Bug 901237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915912</URL>
        <Description>SUSE Bug 915912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.</Note>
    </Notes>
    <CVE>CVE-2014-6494</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6494.html</URL>
        <Description>CVE-2014-6494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901237</URL>
        <Description>SUSE Bug 901237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915912</URL>
        <Description>SUSE Bug 915912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.</Note>
    </Notes>
    <CVE>CVE-2014-6496</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6496.html</URL>
        <Description>CVE-2014-6496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901237</URL>
        <Description>SUSE Bug 901237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915912</URL>
        <Description>SUSE Bug 915912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.</Note>
    </Notes>
    <CVE>CVE-2014-6500</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6500.html</URL>
        <Description>CVE-2014-6500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901237</URL>
        <Description>SUSE Bug 901237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915912</URL>
        <Description>SUSE Bug 915912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.</Note>
    </Notes>
    <CVE>CVE-2014-6507</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6507.html</URL>
        <Description>CVE-2014-6507</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901237</URL>
        <Description>SUSE Bug 901237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915912</URL>
        <Description>SUSE Bug 915912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.</Note>
    </Notes>
    <CVE>CVE-2014-6555</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6555.html</URL>
        <Description>CVE-2014-6555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901237</URL>
        <Description>SUSE Bug 901237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915912</URL>
        <Description>SUSE Bug 915912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.</Note>
    </Notes>
    <CVE>CVE-2014-6559</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6559.html</URL>
        <Description>CVE-2014-6559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901237</URL>
        <Description>SUSE Bug 901237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915912</URL>
        <Description>SUSE Bug 915912</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.</Note>
    </Notes>
    <CVE>CVE-2014-6568</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6568.html</URL>
        <Description>CVE-2014-6568</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914058</URL>
        <Description>SUSE Bug 914058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915911</URL>
        <Description>SUSE Bug 915911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.</Note>
    </Notes>
    <CVE>CVE-2014-8964</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8964.html</URL>
        <Description>CVE-2014-8964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/906574</URL>
        <Description>SUSE Bug 906574</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924960</URL>
        <Description>SUSE Bug 924960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933288</URL>
        <Description>SUSE Bug 933288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936408</URL>
        <Description>SUSE Bug 936408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958373</URL>
        <Description>SUSE Bug 958373</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.</Note>
    </Notes>
    <CVE>CVE-2015-0374</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0374.html</URL>
        <Description>CVE-2015-0374</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914058</URL>
        <Description>SUSE Bug 914058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915911</URL>
        <Description>SUSE Bug 915911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.</Note>
    </Notes>
    <CVE>CVE-2015-0381</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0381.html</URL>
        <Description>CVE-2015-0381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914058</URL>
        <Description>SUSE Bug 914058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915911</URL>
        <Description>SUSE Bug 915911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.</Note>
    </Notes>
    <CVE>CVE-2015-0382</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0382.html</URL>
        <Description>CVE-2015-0382</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914058</URL>
        <Description>SUSE Bug 914058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915911</URL>
        <Description>SUSE Bug 915911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.</Note>
    </Notes>
    <CVE>CVE-2015-0411</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0411.html</URL>
        <Description>CVE-2015-0411</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914058</URL>
        <Description>SUSE Bug 914058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915911</URL>
        <Description>SUSE Bug 915911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.</Note>
    </Notes>
    <CVE>CVE-2015-0432</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0432.html</URL>
        <Description>CVE-2015-0432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914058</URL>
        <Description>SUSE Bug 914058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915911</URL>
        <Description>SUSE Bug 915911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.</Note>
    </Notes>
    <CVE>CVE-2015-0433</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0433.html</URL>
        <Description>CVE-2015-0433</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936409</URL>
        <Description>SUSE Bug 936409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.</Note>
    </Notes>
    <CVE>CVE-2015-0441</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0441.html</URL>
        <Description>CVE-2015-0441</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936409</URL>
        <Description>SUSE Bug 936409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.</Note>
    </Notes>
    <CVE>CVE-2015-0499</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0499.html</URL>
        <Description>CVE-2015-0499</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936408</URL>
        <Description>SUSE Bug 936408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.</Note>
    </Notes>
    <CVE>CVE-2015-0501</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0501.html</URL>
        <Description>CVE-2015-0501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936408</URL>
        <Description>SUSE Bug 936408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.</Note>
    </Notes>
    <CVE>CVE-2015-0505</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0505.html</URL>
        <Description>CVE-2015-0505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936408</URL>
        <Description>SUSE Bug 936408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.</Note>
    </Notes>
    <CVE>CVE-2015-2325</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2325.html</URL>
        <Description>CVE-2015-2325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924960</URL>
        <Description>SUSE Bug 924960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933288</URL>
        <Description>SUSE Bug 933288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936408</URL>
        <Description>SUSE Bug 936408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958373</URL>
        <Description>SUSE Bug 958373</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".</Note>
    </Notes>
    <CVE>CVE-2015-2326</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2326.html</URL>
        <Description>CVE-2015-2326</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924960</URL>
        <Description>SUSE Bug 924960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924961</URL>
        <Description>SUSE Bug 924961</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933288</URL>
        <Description>SUSE Bug 933288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936408</URL>
        <Description>SUSE Bug 936408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958373</URL>
        <Description>SUSE Bug 958373</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.</Note>
    </Notes>
    <CVE>CVE-2015-2568</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2568.html</URL>
        <Description>CVE-2015-2568</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936409</URL>
        <Description>SUSE Bug 936409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.</Note>
    </Notes>
    <CVE>CVE-2015-2571</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2571.html</URL>
        <Description>CVE-2015-2571</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936408</URL>
        <Description>SUSE Bug 936408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.</Note>
    </Notes>
    <CVE>CVE-2015-2573</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2573.html</URL>
        <Description>CVE-2015-2573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936409</URL>
        <Description>SUSE Bug 936409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.</Note>
    </Notes>
    <CVE>CVE-2015-3152</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3152.html</URL>
        <Description>CVE-2015-3152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037590</URL>
        <Description>SUSE Bug 1037590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1047059</URL>
        <Description>SUSE Bug 1047059</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088681</URL>
        <Description>SUSE Bug 1088681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924663</URL>
        <Description>SUSE Bug 924663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928962</URL>
        <Description>SUSE Bug 928962</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936407</URL>
        <Description>SUSE Bug 936407</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.</Note>
    </Notes>
    <CVE>CVE-2015-4000</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.3</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4000.html</URL>
        <Description>CVE-2015-4000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074631</URL>
        <Description>SUSE Bug 1074631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931600</URL>
        <Description>SUSE Bug 931600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931698</URL>
        <Description>SUSE Bug 931698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931723</URL>
        <Description>SUSE Bug 931723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931845</URL>
        <Description>SUSE Bug 931845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932026</URL>
        <Description>SUSE Bug 932026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932483</URL>
        <Description>SUSE Bug 932483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934789</URL>
        <Description>SUSE Bug 934789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935033</URL>
        <Description>SUSE Bug 935033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935540</URL>
        <Description>SUSE Bug 935540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935979</URL>
        <Description>SUSE Bug 935979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936168</URL>
        <Description>SUSE Bug 936168</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937202</URL>
        <Description>SUSE Bug 937202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937724</URL>
        <Description>SUSE Bug 937724</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937766</URL>
        <Description>SUSE Bug 937766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938432</URL>
        <Description>SUSE Bug 938432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938905</URL>
        <Description>SUSE Bug 938905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938906</URL>
        <Description>SUSE Bug 938906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938913</URL>
        <Description>SUSE Bug 938913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938945</URL>
        <Description>SUSE Bug 938945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941696</URL>
        <Description>SUSE Bug 941696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943664</URL>
        <Description>SUSE Bug 943664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944729</URL>
        <Description>SUSE Bug 944729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945582</URL>
        <Description>SUSE Bug 945582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955589</URL>
        <Description>SUSE Bug 955589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980406</URL>
        <Description>SUSE Bug 980406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990592</URL>
        <Description>SUSE Bug 990592</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
