Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2006-4226 (GCVE-0-2006-4226)
Vulnerability from cvelistv5 – Published: 2006-08-18 19:55 – Updated: 2024-08-07 18:57- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:57:46.518Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "oval:org.mitre.oval:def:10729",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
},
{
"name": "21627",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21627"
},
{
"name": "1016710",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016710"
},
{
"name": "RHSA-2007:0152",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
},
{
"name": "TA07-072A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"name": "21762",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21762"
},
{
"name": "ADV-2006-3306",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3306"
},
{
"name": "SUSE-SR:2006:023",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"name": "APPLE-SA-2007-03-13",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"name": "21506",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21506"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://docs.info.apple.com/article.html?artnum=305214"
},
{
"name": "24744",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24744"
},
{
"name": "19559",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19559"
},
{
"name": "mysql-case-privilege-escalation(28448)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
},
{
"name": "MDKSA-2006:149",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
},
{
"name": "22080",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22080"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.mysql.com/bug.php?id=17647"
},
{
"name": "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.mysql.com/commits/5927"
},
{
"name": "DSA-1169",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2006/dsa-1169"
},
{
"name": "ADV-2007-0930",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0930"
},
{
"name": "RHSA-2007:0083",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
},
{
"name": "24479",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24479"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-05-04T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "oval:org.mitre.oval:def:10729",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
},
{
"name": "21627",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21627"
},
{
"name": "1016710",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016710"
},
{
"name": "RHSA-2007:0152",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
},
{
"name": "TA07-072A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"name": "21762",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21762"
},
{
"name": "ADV-2006-3306",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3306"
},
{
"name": "SUSE-SR:2006:023",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"name": "APPLE-SA-2007-03-13",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"name": "21506",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21506"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://docs.info.apple.com/article.html?artnum=305214"
},
{
"name": "24744",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24744"
},
{
"name": "19559",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19559"
},
{
"name": "mysql-case-privilege-escalation(28448)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
},
{
"name": "MDKSA-2006:149",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
},
{
"name": "22080",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22080"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.mysql.com/bug.php?id=17647"
},
{
"name": "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.mysql.com/commits/5927"
},
{
"name": "DSA-1169",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2006/dsa-1169"
},
{
"name": "ADV-2007-0930",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0930"
},
{
"name": "RHSA-2007:0083",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
},
{
"name": "24479",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24479"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4226",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:10729",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
},
{
"name": "21627",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21627"
},
{
"name": "1016710",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016710"
},
{
"name": "RHSA-2007:0152",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
},
{
"name": "TA07-072A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"name": "21762",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21762"
},
{
"name": "ADV-2006-3306",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3306"
},
{
"name": "SUSE-SR:2006:023",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"name": "APPLE-SA-2007-03-13",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"name": "21506",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21506"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305214",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305214"
},
{
"name": "24744",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24744"
},
{
"name": "19559",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19559"
},
{
"name": "mysql-case-privilege-escalation(28448)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
},
{
"name": "MDKSA-2006:149",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
},
{
"name": "22080",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22080"
},
{
"name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
},
{
"name": "http://bugs.mysql.com/bug.php?id=17647",
"refsource": "MISC",
"url": "http://bugs.mysql.com/bug.php?id=17647"
},
{
"name": "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)",
"refsource": "MLIST",
"url": "http://lists.mysql.com/commits/5927"
},
{
"name": "DSA-1169",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1169"
},
{
"name": "ADV-2007-0930",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0930"
},
{
"name": "RHSA-2007:0083",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
},
{
"name": "24479",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24479"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4226",
"datePublished": "2006-08-18T19:55:00.000Z",
"dateReserved": "2006-08-18T00:00:00.000Z",
"dateUpdated": "2024-08-07T18:57:46.518Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2006-4226",
"date": "2026-05-20",
"epss": "0.0061",
"percentile": "0.69963"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFEDB808-A8D8-403E-9103-AB486C793EF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C6AAD13-3CA1-4543-834B-39FB53D4462D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB1CEA0B-1234-4166-BD32-CCBB4016A9BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADBEDF5A-5205-4012-B9B8-0FA304E7119A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EF35900-4051-4E07-9BFA-347BEAB8AB67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AC969A5-52CC-44F2-A929-DE559A5D7624\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A4D224C-8ABF-41A0-A7BE-C10C2387DE95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C93CE88F-2941-4A08-9472-359CF214F81C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC198CDB-CAC0-41DD-9FCD-42536E7FE11A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B77A2761-2B44-4061-9C29-A54F90A1AD83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B3AD851-056F-4E57-B85B-4AC5A5A20C0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD24EA8C-4FCA-4F40-B2EA-7DFA49432483\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"754B78F2-A03C-40BE-812B-F5E57B93D20B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"575039BD-A8B6-4459-B5F0-F220A94650EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDA03768-74D2-4C5D-ABCF-8A91F9E6C273\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"542B23CB-7535-4EF7-B926-466A5161A0D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45E686C3-4100-465C-9F45-068580B496E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB618DB2-6B00-4E99-8232-937D2C51986B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"665E063D-355D-4A5A-A05F-36BF582DE36F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"214E3CF9-6362-4F5A-91B7-5E69564F7144\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35BED939-3366-4CBF-B6BF-29C0C42E97F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41BEAD26-ADDC-4FC6-A493-584315183936\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"153E8DFB-4197-4117-87C6-C0FBE3C05600\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"765BF98E-7AB1-45EA-9935-2C311E621211\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCDCB80C-60B8-468E-A689-2C9DFF1F51C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22408224-0634-4CC6-888F-892E9D932CE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B2646B4-593E-4AC9-8292-1AD805632DC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD959AEC-EE71-4E86-9AD0-ED6FF45AC848\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E30EC061-A04C-4402-91A0-B7E8DA9DBA5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D57E557-7F6D-4618-86AC-B10C08341900\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ECE1A40-0603-421E-BCCF-111EC3C2BCE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*\", \"matchCriteriaId\": \"B657610A-8EDB-407B-A81F-C3CDF2EF6ED3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EC10CD2-B9A3-46DD-839E-C7FB6647155F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4D5D4B9-B831-4DDD-8FDD-3D14F167822A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EC21395-4C78-4343-9452-578B24C2656D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21BC82AF-5E80-4AE4-A765-9D3725D9E5F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CF2E25B-8689-4396-9C2B-99EEF4AB02BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5032D74E-CC8D-4217-AEF0-98DCD1820AE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3340604-0D38-4494-847B-E9E8B0026A28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC117BF1-3127-477A-9500-C9A32596ED8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC54D7B3-DC9B-43AC-BE10-565BDF292A88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6A7AC36-4E5D-483B-939E-257FDEDE48EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FED5BA55-FF4F-4F89-89B1-554624DDA1AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A0C43BB-81C6-496F-AC7B-61382DE76B71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C9FF055-99BC-4E15-80C8-80FEF3CBA990\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6132F5E-ADE6-44C2-85BD-17408594789F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B6779AC-EF41-46B5-8B26-07FA2537E5B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F038AF5-C96C-43EE-9D46-1DD8CAF567EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E24BD3CF-0047-47F8-8B13-E2A6348E3924\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB7196E5-8483-4872-A78A-8BE7EC551CA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"14DDA057-D211-42BD-B8AF-F250F1C5B88C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32CA2F70-77E4-4280-B845-4CE5774162C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA788329-9A66-49EA-B7E4-E465C0E7E320\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66C06765-D153-4D4D-B8CD-DB2E386E082B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4297E6B7-6C5A-4D52-A66B-F9D1AE17E988\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"141D83A9-89C2-456F-B70D-F274EBE3EAC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6769975-47A4-4D0A-9181-F59776D13D38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11E942FA-A458-4607-B48D-FCA112AFF1CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E241159-FAA4-4DCF-AB68-BE36DF95D59A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB6995B6-B594-454B-BD26-EACFB8241DA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC14E107-7C11-4D5B-994B-CCACFD62097E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8105AE3-7FF6-43C5-9B47-29ACD4DD7C3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*\", \"matchCriteriaId\": \"19001041-22C4-4D2C-A918-378DACBB1DF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F610D56-6BB6-48FB-B43A-670CE9168500\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1668BB5B-E7FB-4430-B8D5-89E308F5DD39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7777E919-FD4B-452B-88D7-165410C703F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67C52D66-3BCA-4854-BF09-CB6DF1AC0E48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF54CC8D-B736-461D-B693-686E862EF969\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"053ACE9B-A146-42C0-ADB2-47F6119965D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30B4F891-2A03-45A8-A49C-7F8B8F7D8407\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69E62AC4-954E-476C-98BE-C138E328AE7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B88385C-F5FB-401F-80D5-5BF11CE3C19D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73F49A1D-BCA3-4772-8AB3-621CCC997B3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F719DD8E-8379-43C3-97F9-DE350E457F7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"342BB65B-1358-441C-B59A-1756BCC6414A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8589B1E7-0D6D-44B4-A36E-8225C5D15828\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88FEEE64-899F-4F55-B829-641706E29E32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8597F56-BB14-480C-91CD-CAB96A9DDD8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EB2323C-EFE2-407A-9AE9-8717FA9F8625\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6341F695-6034-4CC1-9485-ACD3A0E1A079\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1DF5F19-ECD9-457F-89C6-6F0271CF4766\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.\"}, {\"lang\": \"es\", \"value\": \"MySQL anteriores a 4.1.21, 5.0 anterior a 5.0.25, y 5.1 anteriores a 5.1.12, cuando se ejecutan en sistemas de fichero sensibles al uso de may\\u00fasculas o min\\u00fascular, permite a usuarios autenticados remotamente crear o acceder a una base de datos cuando el nombre de la base de datos difiere s\\u00f3lo en el uso de may\\u00fasculas y min\\u00fasculas de una base de datos para la cual tienen permisos.\"}]",
"evaluatorSolution": "Successful exploitation requires that MySQL runs on a system with a file system supporting case-sensitive file names.\r\nThis vulnerability is addresses in the following product releases: \r\nMySQL, MySQL, 4.1.21\r\nMySQL, MySQL, 5.0.25\r\nMySQL, MySQL, 5.1.12",
"id": "CVE-2006-4226",
"lastModified": "2024-11-21T00:15:26.157",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:S/C:P/I:P/A:N\", \"baseScore\": 3.6, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2006-08-18T20:04:00.000",
"references": "[{\"url\": \"http://bugs.mysql.com/bug.php?id=17647\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://docs.info.apple.com/article.html?artnum=305214\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.mysql.com/commits/5927\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/21506\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/21627\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/21762\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/22080\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/24479\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/24744\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1016710\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2006/dsa-1169\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2006:149\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2006_23_sr.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0083.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0152.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/19559\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA07-072A.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2006/3306\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/0930\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/28448\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://bugs.mysql.com/bug.php?id=17647\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://docs.info.apple.com/article.html?artnum=305214\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.mysql.com/commits/5927\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/21506\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/21627\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21762\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/22080\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/24479\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/24744\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1016710\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2006/dsa-1169\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2006:149\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2006_23_sr.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0083.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0152.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/19559\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA07-072A.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2006/3306\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/0930\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/28448\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203426\\n\\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\\nhttp://www.redhat.com/security/updates/classification/\\n\\nThis issue does not affect Red Hat Enterprise Linux 2.1 or 3\", \"lastModified\": \"2006-09-19T00:00:00\"}]",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2006-4226\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-08-18T20:04:00.000\",\"lastModified\":\"2026-04-16T00:27:16.627\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.\"},{\"lang\":\"es\",\"value\":\"MySQL anteriores a 4.1.21, 5.0 anterior a 5.0.25, y 5.1 anteriores a 5.1.12, cuando se ejecutan en sistemas de fichero sensibles al uso de may\u00fasculas o min\u00fascular, permite a usuarios autenticados remotamente crear o acceder a una base de datos cuando el nombre de la base de datos difiere s\u00f3lo en el uso de may\u00fasculas y min\u00fasculas de una base de datos para la cual tienen permisos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:S/C:P/I:P/A:N\",\"baseScore\":3.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFEDB808-A8D8-403E-9103-AB486C793EF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C6AAD13-3CA1-4543-834B-39FB53D4462D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB1CEA0B-1234-4166-BD32-CCBB4016A9BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADBEDF5A-5205-4012-B9B8-0FA304E7119A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF35900-4051-4E07-9BFA-347BEAB8AB67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC969A5-52CC-44F2-A929-DE559A5D7624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A4D224C-8ABF-41A0-A7BE-C10C2387DE95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C93CE88F-2941-4A08-9472-359CF214F81C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC198CDB-CAC0-41DD-9FCD-42536E7FE11A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B77A2761-2B44-4061-9C29-A54F90A1AD83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B3AD851-056F-4E57-B85B-4AC5A5A20C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD24EA8C-4FCA-4F40-B2EA-7DFA49432483\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"754B78F2-A03C-40BE-812B-F5E57B93D20B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"575039BD-A8B6-4459-B5F0-F220A94650EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDA03768-74D2-4C5D-ABCF-8A91F9E6C273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"542B23CB-7535-4EF7-B926-466A5161A0D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45E686C3-4100-465C-9F45-068580B496E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB618DB2-6B00-4E99-8232-937D2C51986B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"665E063D-355D-4A5A-A05F-36BF582DE36F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"214E3CF9-6362-4F5A-91B7-5E69564F7144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35BED939-3366-4CBF-B6BF-29C0C42E97F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41BEAD26-ADDC-4FC6-A493-584315183936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"153E8DFB-4197-4117-87C6-C0FBE3C05600\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"765BF98E-7AB1-45EA-9935-2C311E621211\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDCB80C-60B8-468E-A689-2C9DFF1F51C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22408224-0634-4CC6-888F-892E9D932CE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B2646B4-593E-4AC9-8292-1AD805632DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD959AEC-EE71-4E86-9AD0-ED6FF45AC848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30EC061-A04C-4402-91A0-B7E8DA9DBA5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D57E557-7F6D-4618-86AC-B10C08341900\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECE1A40-0603-421E-BCCF-111EC3C2BCE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"B657610A-8EDB-407B-A81F-C3CDF2EF6ED3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC10CD2-B9A3-46DD-839E-C7FB6647155F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D5D4B9-B831-4DDD-8FDD-3D14F167822A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC21395-4C78-4343-9452-578B24C2656D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21BC82AF-5E80-4AE4-A765-9D3725D9E5F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF2E25B-8689-4396-9C2B-99EEF4AB02BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5032D74E-CC8D-4217-AEF0-98DCD1820AE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3340604-0D38-4494-847B-E9E8B0026A28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC117BF1-3127-477A-9500-C9A32596ED8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC54D7B3-DC9B-43AC-BE10-565BDF292A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A7AC36-4E5D-483B-939E-257FDEDE48EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED5BA55-FF4F-4F89-89B1-554624DDA1AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0C43BB-81C6-496F-AC7B-61382DE76B71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C9FF055-99BC-4E15-80C8-80FEF3CBA990\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6132F5E-ADE6-44C2-85BD-17408594789F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B6779AC-EF41-46B5-8B26-07FA2537E5B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F038AF5-C96C-43EE-9D46-1DD8CAF567EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E24BD3CF-0047-47F8-8B13-E2A6348E3924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB7196E5-8483-4872-A78A-8BE7EC551CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"14DDA057-D211-42BD-B8AF-F250F1C5B88C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32CA2F70-77E4-4280-B845-4CE5774162C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA788329-9A66-49EA-B7E4-E465C0E7E320\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66C06765-D153-4D4D-B8CD-DB2E386E082B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4297E6B7-6C5A-4D52-A66B-F9D1AE17E988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"141D83A9-89C2-456F-B70D-F274EBE3EAC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6769975-47A4-4D0A-9181-F59776D13D38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11E942FA-A458-4607-B48D-FCA112AFF1CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E241159-FAA4-4DCF-AB68-BE36DF95D59A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB6995B6-B594-454B-BD26-EACFB8241DA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC14E107-7C11-4D5B-994B-CCACFD62097E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8105AE3-7FF6-43C5-9B47-29ACD4DD7C3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"19001041-22C4-4D2C-A918-378DACBB1DF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F610D56-6BB6-48FB-B43A-670CE9168500\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1668BB5B-E7FB-4430-B8D5-89E308F5DD39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7777E919-FD4B-452B-88D7-165410C703F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C52D66-3BCA-4854-BF09-CB6DF1AC0E48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF54CC8D-B736-461D-B693-686E862EF969\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"053ACE9B-A146-42C0-ADB2-47F6119965D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B4F891-2A03-45A8-A49C-7F8B8F7D8407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69E62AC4-954E-476C-98BE-C138E328AE7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B88385C-F5FB-401F-80D5-5BF11CE3C19D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73F49A1D-BCA3-4772-8AB3-621CCC997B3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F719DD8E-8379-43C3-97F9-DE350E457F7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342BB65B-1358-441C-B59A-1756BCC6414A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8589B1E7-0D6D-44B4-A36E-8225C5D15828\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88FEEE64-899F-4F55-B829-641706E29E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8597F56-BB14-480C-91CD-CAB96A9DDD8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB2323C-EFE2-407A-9AE9-8717FA9F8625\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6341F695-6034-4CC1-9485-ACD3A0E1A079\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DF5F19-ECD9-457F-89C6-6F0271CF4766\"}]}]}],\"references\":[{\"url\":\"http://bugs.mysql.com/bug.php?id=17647\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305214\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.mysql.com/commits/5927\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/21506\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21627\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21762\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22080\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/24479\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/24744\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016710\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1169\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:149\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_23_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0083.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0152.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/19559\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-072A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3306\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0930\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/28448\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.mysql.com/bug.php?id=17647\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305214\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.mysql.com/commits/5927\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/21506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21627\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21762\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22080\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24744\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016710\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1169\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:149\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_23_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0083.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0152.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/19559\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-072A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3306\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/28448\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorSolution\":\"Successful exploitation requires that MySQL runs on a system with a file system supporting case-sensitive file names.\\r\\nThis vulnerability is addresses in the following product releases: \\r\\nMySQL, MySQL, 4.1.21\\r\\nMySQL, MySQL, 5.0.25\\r\\nMySQL, MySQL, 5.1.12\",\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203426\\n\\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\\nhttp://www.redhat.com/security/updates/classification/\\n\\nThis issue does not affect Red Hat Enterprise Linux 2.1 or 3\",\"lastModified\":\"2006-09-19T00:00:00\"}]}}"
}
}
CERTA-2007-AVI-124
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités affectent MacOS X. Les plus graves permettent à une personne malintentionnée d'exécuter du code arbitraire à distance.
Description
Plusieurs composants de MacOS X sont sujets à des vulnérabilités, les plus graves permettant à un attaquant distant d'exécuter du code arbitraire.
Les composants impactés sont : ColorSync (CVE-2007-0719), CoreGraphics, Crash Reporter (CVE-2007-0467), CUPS (CVE-2007-0720), Disk Images (CVE-2007-0721, CVE-2007-0722, CVE-2006-6061, CVE-2006-6062, CVE-2006-5679, CVE-2007-0229, CVE-2007-0267, CVE-2007-0299), DS Plug-Ins (CVE-2007-0723), Flash Player (CVE-2006-5330), GNU Tar (CVE-2006-0300, CVE-2006-6097), HFS (CVE-2007-0318), HID Family (CVE-2007-0724), ImageIO (CVE-2007-1071, CVE-2007-0733), Kernel (CVE-2006-5836, CVE-2006-6129, CVE-2006-6173), MySQL Server (CVE-2006-1516, CVE-2006-1517, CVE-2006-2753, CVE-2006-3081, CVE-2006-4031, CVE-2006-4226, CVE-2006-3469), Networking (CVE-2006-6130, CVE-2007-0236), OpenSSH (CVE-2007-0726, CVE-2006-0225, CVE-2006-4924, CVE-2006-5051, CVE-2006-5052), Printing (CVE-2007-0728), QuickDraw Manager (CVE-2007-0588), servermgrd (CVE-2007-0730), SMB File Server (CVE-2007-0731), Software Update (CVE-2007-0463), sudo (CVE-2005-2959), WebLog (CVE-2006-4829).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MacOS X 10.3.9 et MacOS X Server 10.3.9 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "MacOS X 10.4 et MacOS X Server 10.4.",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs composants de MacOS X sont sujets \u00e0 des vuln\u00e9rabilit\u00e9s, les\nplus graves permettant \u00e0 un attaquant distant d\u0027ex\u00e9cuter du code\narbitraire. \n\nLes composants impact\u00e9s sont : ColorSync (CVE-2007-0719), CoreGraphics,\nCrash Reporter (CVE-2007-0467), CUPS (CVE-2007-0720), Disk Images\n(CVE-2007-0721, CVE-2007-0722, CVE-2006-6061, CVE-2006-6062,\nCVE-2006-5679, CVE-2007-0229, CVE-2007-0267, CVE-2007-0299), DS Plug-Ins\n(CVE-2007-0723), Flash Player (CVE-2006-5330), GNU Tar (CVE-2006-0300,\nCVE-2006-6097), HFS (CVE-2007-0318), HID Family (CVE-2007-0724), ImageIO\n(CVE-2007-1071, CVE-2007-0733), Kernel (CVE-2006-5836, CVE-2006-6129,\nCVE-2006-6173), MySQL Server (CVE-2006-1516, CVE-2006-1517,\nCVE-2006-2753, CVE-2006-3081, CVE-2006-4031, CVE-2006-4226,\nCVE-2006-3469), Networking (CVE-2006-6130, CVE-2007-0236), OpenSSH\n(CVE-2007-0726, CVE-2006-0225, CVE-2006-4924, CVE-2006-5051,\nCVE-2006-5052), Printing (CVE-2007-0728), QuickDraw Manager\n(CVE-2007-0588), servermgrd (CVE-2007-0730), SMB File Server\n(CVE-2007-0731), Software Update (CVE-2007-0463), sudo (CVE-2005-2959),\nWebLog (CVE-2006-4829).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-3469",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3469"
},
{
"name": "CVE-2006-6061",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6061"
},
{
"name": "CVE-2006-2753",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2753"
},
{
"name": "CVE-2007-0722",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0722"
},
{
"name": "CVE-2007-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0229"
},
{
"name": "CVE-2006-6173",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6173"
},
{
"name": "CVE-2007-0733",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0733"
},
{
"name": "CVE-2006-5836",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5836"
},
{
"name": "CVE-2007-0720",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0720"
},
{
"name": "CVE-2006-5052",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5052"
},
{
"name": "CVE-2006-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3081"
},
{
"name": "CVE-2007-0318",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0318"
},
{
"name": "CVE-2007-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0236"
},
{
"name": "CVE-2006-4829",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4829"
},
{
"name": "CVE-2006-1517",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-1517"
},
{
"name": "CVE-2006-4924",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4924"
},
{
"name": "CVE-2005-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2959"
},
{
"name": "CVE-2007-0728",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0728"
},
{
"name": "CVE-2006-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6129"
},
{
"name": "CVE-2007-0267",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0267"
},
{
"name": "CVE-2007-0731",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0731"
},
{
"name": "CVE-2007-0726",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0726"
},
{
"name": "CVE-2006-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4226"
},
{
"name": "CVE-2007-0299",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0299"
},
{
"name": "CVE-2007-0724",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0724"
},
{
"name": "CVE-2007-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1071"
},
{
"name": "CVE-2006-4031",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4031"
},
{
"name": "CVE-2007-0588",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0588"
},
{
"name": "CVE-2006-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-1516"
},
{
"name": "CVE-2006-5679",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5679"
},
{
"name": "CVE-2007-0721",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0721"
},
{
"name": "CVE-2006-6130",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6130"
},
{
"name": "CVE-2006-5330",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5330"
},
{
"name": "CVE-2007-0730",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0730"
},
{
"name": "CVE-2006-0300",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0300"
},
{
"name": "CVE-2007-0719",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0719"
},
{
"name": "CVE-2006-6062",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6062"
},
{
"name": "CVE-2006-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0225"
},
{
"name": "CVE-2006-5051",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5051"
},
{
"name": "CVE-2007-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0467"
},
{
"name": "CVE-2007-0463",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0463"
},
{
"name": "CVE-2006-6097",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6097"
},
{
"name": "CVE-2007-0723",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0723"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple du 12 mars 2007 :",
"url": "http://docs.info.apple.com/article.html?artnum=305214"
}
],
"reference": "CERTA-2007-AVI-124",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s affectent MacOS X. Les plus graves permettent \u00e0\nune personne malintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans MacOS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 2007-003 de MacOS X",
"url": null
}
]
}
CERTA-2007-AVI-124
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités affectent MacOS X. Les plus graves permettent à une personne malintentionnée d'exécuter du code arbitraire à distance.
Description
Plusieurs composants de MacOS X sont sujets à des vulnérabilités, les plus graves permettant à un attaquant distant d'exécuter du code arbitraire.
Les composants impactés sont : ColorSync (CVE-2007-0719), CoreGraphics, Crash Reporter (CVE-2007-0467), CUPS (CVE-2007-0720), Disk Images (CVE-2007-0721, CVE-2007-0722, CVE-2006-6061, CVE-2006-6062, CVE-2006-5679, CVE-2007-0229, CVE-2007-0267, CVE-2007-0299), DS Plug-Ins (CVE-2007-0723), Flash Player (CVE-2006-5330), GNU Tar (CVE-2006-0300, CVE-2006-6097), HFS (CVE-2007-0318), HID Family (CVE-2007-0724), ImageIO (CVE-2007-1071, CVE-2007-0733), Kernel (CVE-2006-5836, CVE-2006-6129, CVE-2006-6173), MySQL Server (CVE-2006-1516, CVE-2006-1517, CVE-2006-2753, CVE-2006-3081, CVE-2006-4031, CVE-2006-4226, CVE-2006-3469), Networking (CVE-2006-6130, CVE-2007-0236), OpenSSH (CVE-2007-0726, CVE-2006-0225, CVE-2006-4924, CVE-2006-5051, CVE-2006-5052), Printing (CVE-2007-0728), QuickDraw Manager (CVE-2007-0588), servermgrd (CVE-2007-0730), SMB File Server (CVE-2007-0731), Software Update (CVE-2007-0463), sudo (CVE-2005-2959), WebLog (CVE-2006-4829).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MacOS X 10.3.9 et MacOS X Server 10.3.9 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "MacOS X 10.4 et MacOS X Server 10.4.",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs composants de MacOS X sont sujets \u00e0 des vuln\u00e9rabilit\u00e9s, les\nplus graves permettant \u00e0 un attaquant distant d\u0027ex\u00e9cuter du code\narbitraire. \n\nLes composants impact\u00e9s sont : ColorSync (CVE-2007-0719), CoreGraphics,\nCrash Reporter (CVE-2007-0467), CUPS (CVE-2007-0720), Disk Images\n(CVE-2007-0721, CVE-2007-0722, CVE-2006-6061, CVE-2006-6062,\nCVE-2006-5679, CVE-2007-0229, CVE-2007-0267, CVE-2007-0299), DS Plug-Ins\n(CVE-2007-0723), Flash Player (CVE-2006-5330), GNU Tar (CVE-2006-0300,\nCVE-2006-6097), HFS (CVE-2007-0318), HID Family (CVE-2007-0724), ImageIO\n(CVE-2007-1071, CVE-2007-0733), Kernel (CVE-2006-5836, CVE-2006-6129,\nCVE-2006-6173), MySQL Server (CVE-2006-1516, CVE-2006-1517,\nCVE-2006-2753, CVE-2006-3081, CVE-2006-4031, CVE-2006-4226,\nCVE-2006-3469), Networking (CVE-2006-6130, CVE-2007-0236), OpenSSH\n(CVE-2007-0726, CVE-2006-0225, CVE-2006-4924, CVE-2006-5051,\nCVE-2006-5052), Printing (CVE-2007-0728), QuickDraw Manager\n(CVE-2007-0588), servermgrd (CVE-2007-0730), SMB File Server\n(CVE-2007-0731), Software Update (CVE-2007-0463), sudo (CVE-2005-2959),\nWebLog (CVE-2006-4829).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-3469",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3469"
},
{
"name": "CVE-2006-6061",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6061"
},
{
"name": "CVE-2006-2753",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2753"
},
{
"name": "CVE-2007-0722",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0722"
},
{
"name": "CVE-2007-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0229"
},
{
"name": "CVE-2006-6173",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6173"
},
{
"name": "CVE-2007-0733",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0733"
},
{
"name": "CVE-2006-5836",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5836"
},
{
"name": "CVE-2007-0720",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0720"
},
{
"name": "CVE-2006-5052",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5052"
},
{
"name": "CVE-2006-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3081"
},
{
"name": "CVE-2007-0318",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0318"
},
{
"name": "CVE-2007-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0236"
},
{
"name": "CVE-2006-4829",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4829"
},
{
"name": "CVE-2006-1517",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-1517"
},
{
"name": "CVE-2006-4924",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4924"
},
{
"name": "CVE-2005-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2959"
},
{
"name": "CVE-2007-0728",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0728"
},
{
"name": "CVE-2006-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6129"
},
{
"name": "CVE-2007-0267",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0267"
},
{
"name": "CVE-2007-0731",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0731"
},
{
"name": "CVE-2007-0726",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0726"
},
{
"name": "CVE-2006-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4226"
},
{
"name": "CVE-2007-0299",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0299"
},
{
"name": "CVE-2007-0724",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0724"
},
{
"name": "CVE-2007-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1071"
},
{
"name": "CVE-2006-4031",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4031"
},
{
"name": "CVE-2007-0588",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0588"
},
{
"name": "CVE-2006-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-1516"
},
{
"name": "CVE-2006-5679",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5679"
},
{
"name": "CVE-2007-0721",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0721"
},
{
"name": "CVE-2006-6130",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6130"
},
{
"name": "CVE-2006-5330",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5330"
},
{
"name": "CVE-2007-0730",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0730"
},
{
"name": "CVE-2006-0300",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0300"
},
{
"name": "CVE-2007-0719",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0719"
},
{
"name": "CVE-2006-6062",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6062"
},
{
"name": "CVE-2006-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0225"
},
{
"name": "CVE-2006-5051",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5051"
},
{
"name": "CVE-2007-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0467"
},
{
"name": "CVE-2007-0463",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0463"
},
{
"name": "CVE-2006-6097",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6097"
},
{
"name": "CVE-2007-0723",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0723"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple du 12 mars 2007 :",
"url": "http://docs.info.apple.com/article.html?artnum=305214"
}
],
"reference": "CERTA-2007-AVI-124",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s affectent MacOS X. Les plus graves permettent \u00e0\nune personne malintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans MacOS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 2007-003 de MacOS X",
"url": null
}
]
}
FKIE_CVE-2006-4226
Vulnerability from fkie_nvd - Published: 2006-08-18 20:04 - Updated: 2026-04-16 00:27{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
"matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
"matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
"matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
"matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
"matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "E8105AE3-7FF6-43C5-9B47-29ACD4DD7C3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions."
},
{
"lang": "es",
"value": "MySQL anteriores a 4.1.21, 5.0 anterior a 5.0.25, y 5.1 anteriores a 5.1.12, cuando se ejecutan en sistemas de fichero sensibles al uso de may\u00fasculas o min\u00fascular, permite a usuarios autenticados remotamente crear o acceder a una base de datos cuando el nombre de la base de datos difiere s\u00f3lo en el uso de may\u00fasculas y min\u00fasculas de una base de datos para la cual tienen permisos."
}
],
"evaluatorSolution": "Successful exploitation requires that MySQL runs on a system with a file system supporting case-sensitive file names.\r\nThis vulnerability is addresses in the following product releases: \r\nMySQL, MySQL, 4.1.21\r\nMySQL, MySQL, 5.0.25\r\nMySQL, MySQL, 5.1.12",
"id": "CVE-2006-4226",
"lastModified": "2026-04-16T00:27:16.627",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-08-18T20:04:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "http://bugs.mysql.com/bug.php?id=17647"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
},
{
"source": "cve@mitre.org",
"url": "http://docs.info.apple.com/article.html?artnum=305214"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://lists.mysql.com/commits/5927"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21506"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/21627"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/21762"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/22080"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/24479"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/24744"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1016710"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2006/dsa-1169"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
},
{
"source": "cve@mitre.org",
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/19559"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/3306"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0930"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://bugs.mysql.com/bug.php?id=17647"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://docs.info.apple.com/article.html?artnum=305214"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.mysql.com/commits/5927"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21506"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21627"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21762"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/22080"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/24479"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/24744"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1016710"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2006/dsa-1169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/19559"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/3306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0930"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203426\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n\nThis issue does not affect Red Hat Enterprise Linux 2.1 or 3",
"lastModified": "2006-09-19T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-G59J-2MHW-4H6X
Vulnerability from github – Published: 2022-05-01 07:16 – Updated: 2022-05-01 07:16MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
{
"affected": [],
"aliases": [
"CVE-2006-4226"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2006-08-18T20:04:00Z",
"severity": "LOW"
},
"details": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.",
"id": "GHSA-g59j-2mhw-4h6x",
"modified": "2022-05-01T07:16:39Z",
"published": "2022-05-01T07:16:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
},
{
"type": "WEB",
"url": "http://bugs.mysql.com/bug.php?id=17647"
},
{
"type": "WEB",
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
},
{
"type": "WEB",
"url": "http://docs.info.apple.com/article.html?artnum=305214"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"type": "WEB",
"url": "http://lists.mysql.com/commits/5927"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21506"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21627"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21762"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/22080"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/24479"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/24744"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1016710"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2006/dsa-1169"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/19559"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2006/3306"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/0930"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2006-4226
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2006-4226",
"description": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.",
"id": "GSD-2006-4226",
"references": [
"https://www.suse.com/security/cve/CVE-2006-4226.html",
"https://www.debian.org/security/2006/dsa-1169",
"https://access.redhat.com/errata/RHSA-2007:0152",
"https://access.redhat.com/errata/RHSA-2007:0083",
"https://linux.oracle.com/cve/CVE-2006-4226.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2006-4226"
],
"details": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.",
"id": "GSD-2006-4226",
"modified": "2023-12-13T01:19:51.478572Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4226",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:10729",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
},
{
"name": "21627",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21627"
},
{
"name": "1016710",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016710"
},
{
"name": "RHSA-2007:0152",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
},
{
"name": "TA07-072A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"name": "21762",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21762"
},
{
"name": "ADV-2006-3306",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3306"
},
{
"name": "SUSE-SR:2006:023",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"name": "APPLE-SA-2007-03-13",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"name": "21506",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21506"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305214",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305214"
},
{
"name": "24744",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24744"
},
{
"name": "19559",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19559"
},
{
"name": "mysql-case-privilege-escalation(28448)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
},
{
"name": "MDKSA-2006:149",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
},
{
"name": "22080",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22080"
},
{
"name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
},
{
"name": "http://bugs.mysql.com/bug.php?id=17647",
"refsource": "MISC",
"url": "http://bugs.mysql.com/bug.php?id=17647"
},
{
"name": "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)",
"refsource": "MLIST",
"url": "http://lists.mysql.com/commits/5927"
},
{
"name": "DSA-1169",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1169"
},
{
"name": "ADV-2007-0930",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0930"
},
{
"name": "RHSA-2007:0083",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
},
{
"name": "24479",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24479"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4226"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://lists.mysql.com/commits/5927"
},
{
"name": "http://bugs.mysql.com/bug.php?id=17647",
"refsource": "MISC",
"tags": [
"Exploit",
"Patch"
],
"url": "http://bugs.mysql.com/bug.php?id=17647"
},
{
"name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html"
},
{
"name": "19559",
"refsource": "BID",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/19559"
},
{
"name": "21506",
"refsource": "SECUNIA",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21506"
},
{
"name": "1016710",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1016710"
},
{
"name": "DSA-1169",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2006/dsa-1169"
},
{
"name": "21762",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21762"
},
{
"name": "21627",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21627"
},
{
"name": "SUSE-SR:2006:023",
"refsource": "SUSE",
"tags": [],
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
},
{
"name": "22080",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/22080"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305214",
"refsource": "CONFIRM",
"tags": [],
"url": "http://docs.info.apple.com/article.html?artnum=305214"
},
{
"name": "RHSA-2007:0083",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html"
},
{
"name": "24479",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/24479"
},
{
"name": "RHSA-2007:0152",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html"
},
{
"name": "24744",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/24744"
},
{
"name": "APPLE-SA-2007-03-13",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
},
{
"name": "MDKSA-2006:149",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149"
},
{
"name": "TA07-072A",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
},
{
"name": "ADV-2007-0930",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/0930"
},
{
"name": "ADV-2006-3306",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2006/3306"
},
{
"name": "mysql-case-privilege-escalation(28448)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448"
},
{
"name": "oval:org.mitre.oval:def:10729",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2019-12-17T20:16Z",
"publishedDate": "2006-08-18T20:04Z"
}
}
}
OPENSUSE-SU-2024:11038-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libmariadbd-devel-10.6.4-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libmariadbd-devel-10.6.4-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11038",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11038-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-0903 page",
"url": "https://www.suse.com/security/cve/CVE-2006-0903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-4226 page",
"url": "https://www.suse.com/security/cve/CVE-2006-4226/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-5969 page",
"url": "https://www.suse.com/security/cve/CVE-2007-5969/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-6303 page",
"url": "https://www.suse.com/security/cve/CVE-2007-6303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-6304 page",
"url": "https://www.suse.com/security/cve/CVE-2007-6304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-2079 page",
"url": "https://www.suse.com/security/cve/CVE-2008-2079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-4879 page",
"url": "https://www.suse.com/security/cve/CVE-2015-4879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0505 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0598 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0609 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0641 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0641/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0649 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2047 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5440 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5440/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5584 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5584/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5624 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6664 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7440 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7440/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8283 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10320 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10378 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10384 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3243 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3243/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3257 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3257/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3265 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3302 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3308 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3312 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3313 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3313/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3318 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3456 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3636 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2562 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2562/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2668 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2755 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2767 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2781 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2782 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2782/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2786 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3058 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3060 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3064 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3156 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3162 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3174 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3174/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3185 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3200 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3282 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18901 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2503 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2510 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2510/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2614 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2614/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2758 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2758/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2805 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2974 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13249 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13249/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14789 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14812 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15180 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2574 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2574/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2752 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7221 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2372 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2389/"
}
],
"title": "libmariadbd-devel-10.6.4-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11038-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libmariadbd-devel-10.6.4-2.1.aarch64",
"product": {
"name": "libmariadbd-devel-10.6.4-2.1.aarch64",
"product_id": "libmariadbd-devel-10.6.4-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmariadbd19-10.6.4-2.1.aarch64",
"product": {
"name": "libmariadbd19-10.6.4-2.1.aarch64",
"product_id": "libmariadbd19-10.6.4-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "mariadb-10.6.4-2.1.aarch64",
"product": {
"name": "mariadb-10.6.4-2.1.aarch64",
"product_id": "mariadb-10.6.4-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "mariadb-bench-10.6.4-2.1.aarch64",
"product": {
"name": "mariadb-bench-10.6.4-2.1.aarch64",
"product_id": "mariadb-bench-10.6.4-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "mariadb-client-10.6.4-2.1.aarch64",
"product": {
"name": "mariadb-client-10.6.4-2.1.aarch64",
"product_id": "mariadb-client-10.6.4-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "mariadb-errormessages-10.6.4-2.1.aarch64",
"product": {
"name": "mariadb-errormessages-10.6.4-2.1.aarch64",
"product_id": "mariadb-errormessages-10.6.4-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "mariadb-galera-10.6.4-2.1.aarch64",
"product": {
"name": "mariadb-galera-10.6.4-2.1.aarch64",
"product_id": "mariadb-galera-10.6.4-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "mariadb-rpm-macros-10.6.4-2.1.aarch64",
"product": {
"name": "mariadb-rpm-macros-10.6.4-2.1.aarch64",
"product_id": "mariadb-rpm-macros-10.6.4-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "mariadb-test-10.6.4-2.1.aarch64",
"product": {
"name": "mariadb-test-10.6.4-2.1.aarch64",
"product_id": "mariadb-test-10.6.4-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "mariadb-tools-10.6.4-2.1.aarch64",
"product": {
"name": "mariadb-tools-10.6.4-2.1.aarch64",
"product_id": "mariadb-tools-10.6.4-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libmariadbd-devel-10.6.4-2.1.ppc64le",
"product": {
"name": "libmariadbd-devel-10.6.4-2.1.ppc64le",
"product_id": "libmariadbd-devel-10.6.4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmariadbd19-10.6.4-2.1.ppc64le",
"product": {
"name": "libmariadbd19-10.6.4-2.1.ppc64le",
"product_id": "libmariadbd19-10.6.4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mariadb-10.6.4-2.1.ppc64le",
"product": {
"name": "mariadb-10.6.4-2.1.ppc64le",
"product_id": "mariadb-10.6.4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mariadb-bench-10.6.4-2.1.ppc64le",
"product": {
"name": "mariadb-bench-10.6.4-2.1.ppc64le",
"product_id": "mariadb-bench-10.6.4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mariadb-client-10.6.4-2.1.ppc64le",
"product": {
"name": "mariadb-client-10.6.4-2.1.ppc64le",
"product_id": "mariadb-client-10.6.4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mariadb-errormessages-10.6.4-2.1.ppc64le",
"product": {
"name": "mariadb-errormessages-10.6.4-2.1.ppc64le",
"product_id": "mariadb-errormessages-10.6.4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mariadb-galera-10.6.4-2.1.ppc64le",
"product": {
"name": "mariadb-galera-10.6.4-2.1.ppc64le",
"product_id": "mariadb-galera-10.6.4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"product": {
"name": "mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"product_id": "mariadb-rpm-macros-10.6.4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mariadb-test-10.6.4-2.1.ppc64le",
"product": {
"name": "mariadb-test-10.6.4-2.1.ppc64le",
"product_id": "mariadb-test-10.6.4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mariadb-tools-10.6.4-2.1.ppc64le",
"product": {
"name": "mariadb-tools-10.6.4-2.1.ppc64le",
"product_id": "mariadb-tools-10.6.4-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libmariadbd-devel-10.6.4-2.1.s390x",
"product": {
"name": "libmariadbd-devel-10.6.4-2.1.s390x",
"product_id": "libmariadbd-devel-10.6.4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libmariadbd19-10.6.4-2.1.s390x",
"product": {
"name": "libmariadbd19-10.6.4-2.1.s390x",
"product_id": "libmariadbd19-10.6.4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "mariadb-10.6.4-2.1.s390x",
"product": {
"name": "mariadb-10.6.4-2.1.s390x",
"product_id": "mariadb-10.6.4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "mariadb-bench-10.6.4-2.1.s390x",
"product": {
"name": "mariadb-bench-10.6.4-2.1.s390x",
"product_id": "mariadb-bench-10.6.4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "mariadb-client-10.6.4-2.1.s390x",
"product": {
"name": "mariadb-client-10.6.4-2.1.s390x",
"product_id": "mariadb-client-10.6.4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "mariadb-errormessages-10.6.4-2.1.s390x",
"product": {
"name": "mariadb-errormessages-10.6.4-2.1.s390x",
"product_id": "mariadb-errormessages-10.6.4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "mariadb-galera-10.6.4-2.1.s390x",
"product": {
"name": "mariadb-galera-10.6.4-2.1.s390x",
"product_id": "mariadb-galera-10.6.4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "mariadb-rpm-macros-10.6.4-2.1.s390x",
"product": {
"name": "mariadb-rpm-macros-10.6.4-2.1.s390x",
"product_id": "mariadb-rpm-macros-10.6.4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "mariadb-test-10.6.4-2.1.s390x",
"product": {
"name": "mariadb-test-10.6.4-2.1.s390x",
"product_id": "mariadb-test-10.6.4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "mariadb-tools-10.6.4-2.1.s390x",
"product": {
"name": "mariadb-tools-10.6.4-2.1.s390x",
"product_id": "mariadb-tools-10.6.4-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libmariadbd-devel-10.6.4-2.1.x86_64",
"product": {
"name": "libmariadbd-devel-10.6.4-2.1.x86_64",
"product_id": "libmariadbd-devel-10.6.4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmariadbd19-10.6.4-2.1.x86_64",
"product": {
"name": "libmariadbd19-10.6.4-2.1.x86_64",
"product_id": "libmariadbd19-10.6.4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "mariadb-10.6.4-2.1.x86_64",
"product": {
"name": "mariadb-10.6.4-2.1.x86_64",
"product_id": "mariadb-10.6.4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "mariadb-bench-10.6.4-2.1.x86_64",
"product": {
"name": "mariadb-bench-10.6.4-2.1.x86_64",
"product_id": "mariadb-bench-10.6.4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "mariadb-client-10.6.4-2.1.x86_64",
"product": {
"name": "mariadb-client-10.6.4-2.1.x86_64",
"product_id": "mariadb-client-10.6.4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "mariadb-errormessages-10.6.4-2.1.x86_64",
"product": {
"name": "mariadb-errormessages-10.6.4-2.1.x86_64",
"product_id": "mariadb-errormessages-10.6.4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "mariadb-galera-10.6.4-2.1.x86_64",
"product": {
"name": "mariadb-galera-10.6.4-2.1.x86_64",
"product_id": "mariadb-galera-10.6.4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "mariadb-rpm-macros-10.6.4-2.1.x86_64",
"product": {
"name": "mariadb-rpm-macros-10.6.4-2.1.x86_64",
"product_id": "mariadb-rpm-macros-10.6.4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "mariadb-test-10.6.4-2.1.x86_64",
"product": {
"name": "mariadb-test-10.6.4-2.1.x86_64",
"product_id": "mariadb-test-10.6.4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "mariadb-tools-10.6.4-2.1.x86_64",
"product": {
"name": "mariadb-tools-10.6.4-2.1.x86_64",
"product_id": "mariadb-tools-10.6.4-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libmariadbd-devel-10.6.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64"
},
"product_reference": "libmariadbd-devel-10.6.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmariadbd-devel-10.6.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le"
},
"product_reference": "libmariadbd-devel-10.6.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmariadbd-devel-10.6.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x"
},
"product_reference": "libmariadbd-devel-10.6.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmariadbd-devel-10.6.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64"
},
"product_reference": "libmariadbd-devel-10.6.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmariadbd19-10.6.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64"
},
"product_reference": "libmariadbd19-10.6.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmariadbd19-10.6.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le"
},
"product_reference": "libmariadbd19-10.6.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmariadbd19-10.6.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x"
},
"product_reference": "libmariadbd19-10.6.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmariadbd19-10.6.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64"
},
"product_reference": "libmariadbd19-10.6.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-10.6.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64"
},
"product_reference": "mariadb-10.6.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-10.6.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le"
},
"product_reference": "mariadb-10.6.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-10.6.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x"
},
"product_reference": "mariadb-10.6.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-10.6.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64"
},
"product_reference": "mariadb-10.6.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-bench-10.6.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64"
},
"product_reference": "mariadb-bench-10.6.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-bench-10.6.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le"
},
"product_reference": "mariadb-bench-10.6.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-bench-10.6.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x"
},
"product_reference": "mariadb-bench-10.6.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-bench-10.6.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64"
},
"product_reference": "mariadb-bench-10.6.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-client-10.6.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64"
},
"product_reference": "mariadb-client-10.6.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-client-10.6.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le"
},
"product_reference": "mariadb-client-10.6.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-client-10.6.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x"
},
"product_reference": "mariadb-client-10.6.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-client-10.6.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64"
},
"product_reference": "mariadb-client-10.6.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-errormessages-10.6.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64"
},
"product_reference": "mariadb-errormessages-10.6.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-errormessages-10.6.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le"
},
"product_reference": "mariadb-errormessages-10.6.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-errormessages-10.6.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x"
},
"product_reference": "mariadb-errormessages-10.6.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-errormessages-10.6.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64"
},
"product_reference": "mariadb-errormessages-10.6.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-10.6.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64"
},
"product_reference": "mariadb-galera-10.6.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-10.6.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le"
},
"product_reference": "mariadb-galera-10.6.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-10.6.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x"
},
"product_reference": "mariadb-galera-10.6.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-10.6.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64"
},
"product_reference": "mariadb-galera-10.6.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-rpm-macros-10.6.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64"
},
"product_reference": "mariadb-rpm-macros-10.6.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-rpm-macros-10.6.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le"
},
"product_reference": "mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-rpm-macros-10.6.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x"
},
"product_reference": "mariadb-rpm-macros-10.6.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-rpm-macros-10.6.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64"
},
"product_reference": "mariadb-rpm-macros-10.6.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-test-10.6.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64"
},
"product_reference": "mariadb-test-10.6.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-test-10.6.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le"
},
"product_reference": "mariadb-test-10.6.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-test-10.6.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x"
},
"product_reference": "mariadb-test-10.6.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-test-10.6.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64"
},
"product_reference": "mariadb-test-10.6.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-tools-10.6.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64"
},
"product_reference": "mariadb-tools-10.6.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-tools-10.6.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le"
},
"product_reference": "mariadb-tools-10.6.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-tools-10.6.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x"
},
"product_reference": "mariadb-tools-10.6.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-tools-10.6.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
},
"product_reference": "mariadb-tools-10.6.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-0903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-0903"
}
],
"notes": [
{
"category": "general",
"text": "MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-0903",
"url": "https://www.suse.com/security/cve/CVE-2006-0903"
},
{
"category": "external",
"summary": "SUSE Bug 163157 for CVE-2006-0903",
"url": "https://bugzilla.suse.com/163157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2006-0903"
},
{
"cve": "CVE-2006-4226",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-4226"
}
],
"notes": [
{
"category": "general",
"text": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-4226",
"url": "https://www.suse.com/security/cve/CVE-2006-4226"
},
{
"category": "external",
"summary": "SUSE Bug 201711 for CVE-2006-4226",
"url": "https://bugzilla.suse.com/201711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2006-4226"
},
{
"cve": "CVE-2007-5969",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-5969"
}
],
"notes": [
{
"category": "general",
"text": "MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-5969",
"url": "https://www.suse.com/security/cve/CVE-2007-5969"
},
{
"category": "external",
"summary": "SUSE Bug 347223 for CVE-2007-5969",
"url": "https://bugzilla.suse.com/347223"
},
{
"category": "external",
"summary": "SUSE Bug 348003 for CVE-2007-5969",
"url": "https://bugzilla.suse.com/348003"
},
{
"category": "external",
"summary": "SUSE Bug 348307 for CVE-2007-5969",
"url": "https://bugzilla.suse.com/348307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2007-5969"
},
{
"cve": "CVE-2007-6303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-6303"
}
],
"notes": [
{
"category": "general",
"text": "MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-6303",
"url": "https://www.suse.com/security/cve/CVE-2007-6303"
},
{
"category": "external",
"summary": "SUSE Bug 348003 for CVE-2007-6303",
"url": "https://bugzilla.suse.com/348003"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2007-6303"
},
{
"cve": "CVE-2007-6304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-6304"
}
],
"notes": [
{
"category": "general",
"text": "The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-6304",
"url": "https://www.suse.com/security/cve/CVE-2007-6304"
},
{
"category": "external",
"summary": "SUSE Bug 348003 for CVE-2007-6304",
"url": "https://bugzilla.suse.com/348003"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2007-6304"
},
{
"cve": "CVE-2008-2079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-2079"
}
],
"notes": [
{
"category": "general",
"text": "MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-2079",
"url": "https://www.suse.com/security/cve/CVE-2008-2079"
},
{
"category": "external",
"summary": "SUSE Bug 387746 for CVE-2008-2079",
"url": "https://bugzilla.suse.com/387746"
},
{
"category": "external",
"summary": "SUSE Bug 425079 for CVE-2008-2079",
"url": "https://bugzilla.suse.com/425079"
},
{
"category": "external",
"summary": "SUSE Bug 497546 for CVE-2008-2079",
"url": "https://bugzilla.suse.com/497546"
},
{
"category": "external",
"summary": "SUSE Bug 557669 for CVE-2008-2079",
"url": "https://bugzilla.suse.com/557669"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2008-2079"
},
{
"cve": "CVE-2015-4879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-4879"
}
],
"notes": [
{
"category": "general",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-4879",
"url": "https://www.suse.com/security/cve/CVE-2015-4879"
},
{
"category": "external",
"summary": "SUSE Bug 951391 for CVE-2015-4879",
"url": "https://bugzilla.suse.com/951391"
},
{
"category": "external",
"summary": "SUSE Bug 958790 for CVE-2015-4879",
"url": "https://bugzilla.suse.com/958790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-4879"
},
{
"cve": "CVE-2016-0505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0505"
}
],
"notes": [
{
"category": "general",
"text": "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0505",
"url": "https://www.suse.com/security/cve/CVE-2016-0505"
},
{
"category": "external",
"summary": "SUSE Bug 962779 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962779"
},
{
"category": "external",
"summary": "SUSE Bug 962817 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962817"
},
{
"category": "external",
"summary": "SUSE Bug 962930 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962930"
},
{
"category": "external",
"summary": "SUSE Bug 962931 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962931"
},
{
"category": "external",
"summary": "SUSE Bug 962932 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962932"
},
{
"category": "external",
"summary": "SUSE Bug 962934 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962934"
},
{
"category": "external",
"summary": "SUSE Bug 962935 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962935"
},
{
"category": "external",
"summary": "SUSE Bug 962936 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962936"
},
{
"category": "external",
"summary": "SUSE Bug 962937 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962937"
},
{
"category": "external",
"summary": "SUSE Bug 962938 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962938"
},
{
"category": "external",
"summary": "SUSE Bug 962939 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962939"
},
{
"category": "external",
"summary": "SUSE Bug 962941 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962941"
},
{
"category": "external",
"summary": "SUSE Bug 962942 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962942"
},
{
"category": "external",
"summary": "SUSE Bug 962943 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962943"
},
{
"category": "external",
"summary": "SUSE Bug 962944 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962944"
},
{
"category": "external",
"summary": "SUSE Bug 962945 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962945"
},
{
"category": "external",
"summary": "SUSE Bug 962946 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962946"
},
{
"category": "external",
"summary": "SUSE Bug 962947 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962947"
},
{
"category": "external",
"summary": "SUSE Bug 962948 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962948"
},
{
"category": "external",
"summary": "SUSE Bug 962949 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962949"
},
{
"category": "external",
"summary": "SUSE Bug 962950 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962950"
},
{
"category": "external",
"summary": "SUSE Bug 962951 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962951"
},
{
"category": "external",
"summary": "SUSE Bug 962952 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/962952"
},
{
"category": "external",
"summary": "SUSE Bug 980904 for CVE-2016-0505",
"url": "https://bugzilla.suse.com/980904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-0505"
},
{
"cve": "CVE-2016-0598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0598"
}
],
"notes": [
{
"category": "general",
"text": "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0598",
"url": "https://www.suse.com/security/cve/CVE-2016-0598"
},
{
"category": "external",
"summary": "SUSE Bug 962779 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962779"
},
{
"category": "external",
"summary": "SUSE Bug 962817 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962817"
},
{
"category": "external",
"summary": "SUSE Bug 962930 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962930"
},
{
"category": "external",
"summary": "SUSE Bug 962931 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962931"
},
{
"category": "external",
"summary": "SUSE Bug 962932 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962932"
},
{
"category": "external",
"summary": "SUSE Bug 962934 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962934"
},
{
"category": "external",
"summary": "SUSE Bug 962935 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962935"
},
{
"category": "external",
"summary": "SUSE Bug 962936 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962936"
},
{
"category": "external",
"summary": "SUSE Bug 962937 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962937"
},
{
"category": "external",
"summary": "SUSE Bug 962938 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962938"
},
{
"category": "external",
"summary": "SUSE Bug 962939 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962939"
},
{
"category": "external",
"summary": "SUSE Bug 962941 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962941"
},
{
"category": "external",
"summary": "SUSE Bug 962942 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962942"
},
{
"category": "external",
"summary": "SUSE Bug 962943 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962943"
},
{
"category": "external",
"summary": "SUSE Bug 962944 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962944"
},
{
"category": "external",
"summary": "SUSE Bug 962945 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962945"
},
{
"category": "external",
"summary": "SUSE Bug 962946 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962946"
},
{
"category": "external",
"summary": "SUSE Bug 962947 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962947"
},
{
"category": "external",
"summary": "SUSE Bug 962948 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962948"
},
{
"category": "external",
"summary": "SUSE Bug 962949 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962949"
},
{
"category": "external",
"summary": "SUSE Bug 962950 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962950"
},
{
"category": "external",
"summary": "SUSE Bug 962951 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962951"
},
{
"category": "external",
"summary": "SUSE Bug 962952 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/962952"
},
{
"category": "external",
"summary": "SUSE Bug 980904 for CVE-2016-0598",
"url": "https://bugzilla.suse.com/980904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-0598"
},
{
"cve": "CVE-2016-0609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0609"
}
],
"notes": [
{
"category": "general",
"text": "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0609",
"url": "https://www.suse.com/security/cve/CVE-2016-0609"
},
{
"category": "external",
"summary": "SUSE Bug 962779 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962779"
},
{
"category": "external",
"summary": "SUSE Bug 962817 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962817"
},
{
"category": "external",
"summary": "SUSE Bug 962930 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962930"
},
{
"category": "external",
"summary": "SUSE Bug 962931 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962931"
},
{
"category": "external",
"summary": "SUSE Bug 962932 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962932"
},
{
"category": "external",
"summary": "SUSE Bug 962934 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962934"
},
{
"category": "external",
"summary": "SUSE Bug 962935 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962935"
},
{
"category": "external",
"summary": "SUSE Bug 962936 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962936"
},
{
"category": "external",
"summary": "SUSE Bug 962937 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962937"
},
{
"category": "external",
"summary": "SUSE Bug 962938 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962938"
},
{
"category": "external",
"summary": "SUSE Bug 962939 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962939"
},
{
"category": "external",
"summary": "SUSE Bug 962941 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962941"
},
{
"category": "external",
"summary": "SUSE Bug 962942 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962942"
},
{
"category": "external",
"summary": "SUSE Bug 962943 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962943"
},
{
"category": "external",
"summary": "SUSE Bug 962944 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962944"
},
{
"category": "external",
"summary": "SUSE Bug 962945 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962945"
},
{
"category": "external",
"summary": "SUSE Bug 962946 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962946"
},
{
"category": "external",
"summary": "SUSE Bug 962947 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962947"
},
{
"category": "external",
"summary": "SUSE Bug 962948 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962948"
},
{
"category": "external",
"summary": "SUSE Bug 962949 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962949"
},
{
"category": "external",
"summary": "SUSE Bug 962950 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962950"
},
{
"category": "external",
"summary": "SUSE Bug 962951 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962951"
},
{
"category": "external",
"summary": "SUSE Bug 962952 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/962952"
},
{
"category": "external",
"summary": "SUSE Bug 980904 for CVE-2016-0609",
"url": "https://bugzilla.suse.com/980904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-0609"
},
{
"cve": "CVE-2016-0641",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0641"
}
],
"notes": [
{
"category": "general",
"text": "Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0641",
"url": "https://www.suse.com/security/cve/CVE-2016-0641"
},
{
"category": "external",
"summary": "SUSE Bug 976341 for CVE-2016-0641",
"url": "https://bugzilla.suse.com/976341"
},
{
"category": "external",
"summary": "SUSE Bug 980904 for CVE-2016-0641",
"url": "https://bugzilla.suse.com/980904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2016-0641"
},
{
"cve": "CVE-2016-0649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0649"
}
],
"notes": [
{
"category": "general",
"text": "Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0649",
"url": "https://www.suse.com/security/cve/CVE-2016-0649"
},
{
"category": "external",
"summary": "SUSE Bug 976341 for CVE-2016-0649",
"url": "https://bugzilla.suse.com/976341"
},
{
"category": "external",
"summary": "SUSE Bug 980904 for CVE-2016-0649",
"url": "https://bugzilla.suse.com/980904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2016-0649"
},
{
"cve": "CVE-2016-2047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2047"
}
],
"notes": [
{
"category": "general",
"text": "The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a \"/CN=\" string in a field in a certificate, as demonstrated by \"/OU=/CN=bar.com/CN=foo.com.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2047",
"url": "https://www.suse.com/security/cve/CVE-2016-2047"
},
{
"category": "external",
"summary": "SUSE Bug 963806 for CVE-2016-2047",
"url": "https://bugzilla.suse.com/963806"
},
{
"category": "external",
"summary": "SUSE Bug 976341 for CVE-2016-2047",
"url": "https://bugzilla.suse.com/976341"
},
{
"category": "external",
"summary": "SUSE Bug 980904 for CVE-2016-2047",
"url": "https://bugzilla.suse.com/980904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-2047"
},
{
"cve": "CVE-2016-5440",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5440"
}
],
"notes": [
{
"category": "general",
"text": "Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote administrators to affect availability via vectors related to Server: RBR.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5440",
"url": "https://www.suse.com/security/cve/CVE-2016-5440"
},
{
"category": "external",
"summary": "SUSE Bug 989926 for CVE-2016-5440",
"url": "https://bugzilla.suse.com/989926"
},
{
"category": "external",
"summary": "SUSE Bug 991616 for CVE-2016-5440",
"url": "https://bugzilla.suse.com/991616"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-5440"
},
{
"cve": "CVE-2016-5584",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5584"
}
],
"notes": [
{
"category": "general",
"text": "Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5584",
"url": "https://www.suse.com/security/cve/CVE-2016-5584"
},
{
"category": "external",
"summary": "SUSE Bug 1005558 for CVE-2016-5584",
"url": "https://bugzilla.suse.com/1005558"
},
{
"category": "external",
"summary": "SUSE Bug 1008318 for CVE-2016-5584",
"url": "https://bugzilla.suse.com/1008318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-5584"
},
{
"cve": "CVE-2016-5624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5624"
}
],
"notes": [
{
"category": "general",
"text": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5624",
"url": "https://www.suse.com/security/cve/CVE-2016-5624"
},
{
"category": "external",
"summary": "SUSE Bug 1005564 for CVE-2016-5624",
"url": "https://bugzilla.suse.com/1005564"
},
{
"category": "external",
"summary": "SUSE Bug 1008318 for CVE-2016-5624",
"url": "https://bugzilla.suse.com/1008318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-5624"
},
{
"cve": "CVE-2016-6664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6664"
}
],
"notes": [
{
"category": "general",
"text": "mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6664",
"url": "https://www.suse.com/security/cve/CVE-2016-6664"
},
{
"category": "external",
"summary": "SUSE Bug 1008253 for CVE-2016-6664",
"url": "https://bugzilla.suse.com/1008253"
},
{
"category": "external",
"summary": "SUSE Bug 1020868 for CVE-2016-6664",
"url": "https://bugzilla.suse.com/1020868"
},
{
"category": "external",
"summary": "SUSE Bug 1020873 for CVE-2016-6664",
"url": "https://bugzilla.suse.com/1020873"
},
{
"category": "external",
"summary": "SUSE Bug 998309 for CVE-2016-6664",
"url": "https://bugzilla.suse.com/998309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-6664"
},
{
"cve": "CVE-2016-7440",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7440"
}
],
"notes": [
{
"category": "general",
"text": "The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7440",
"url": "https://www.suse.com/security/cve/CVE-2016-7440"
},
{
"category": "external",
"summary": "SUSE Bug 1005581 for CVE-2016-7440",
"url": "https://bugzilla.suse.com/1005581"
},
{
"category": "external",
"summary": "SUSE Bug 1008318 for CVE-2016-7440",
"url": "https://bugzilla.suse.com/1008318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-7440"
},
{
"cve": "CVE-2016-8283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8283"
}
],
"notes": [
{
"category": "general",
"text": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Types.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8283",
"url": "https://www.suse.com/security/cve/CVE-2016-8283"
},
{
"category": "external",
"summary": "SUSE Bug 1005582 for CVE-2016-8283",
"url": "https://bugzilla.suse.com/1005582"
},
{
"category": "external",
"summary": "SUSE Bug 1008318 for CVE-2016-8283",
"url": "https://bugzilla.suse.com/1008318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8283"
},
{
"cve": "CVE-2017-10320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10320"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10320",
"url": "https://www.suse.com/security/cve/CVE-2017-10320"
},
{
"category": "external",
"summary": "SUSE Bug 1064113 for CVE-2017-10320",
"url": "https://bugzilla.suse.com/1064113"
},
{
"category": "external",
"summary": "SUSE Bug 1064119 for CVE-2017-10320",
"url": "https://bugzilla.suse.com/1064119"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10320"
},
{
"cve": "CVE-2017-10378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10378"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10378",
"url": "https://www.suse.com/security/cve/CVE-2017-10378"
},
{
"category": "external",
"summary": "SUSE Bug 1064115 for CVE-2017-10378",
"url": "https://bugzilla.suse.com/1064115"
},
{
"category": "external",
"summary": "SUSE Bug 1064119 for CVE-2017-10378",
"url": "https://bugzilla.suse.com/1064119"
},
{
"category": "external",
"summary": "SUSE Bug 1076505 for CVE-2017-10378",
"url": "https://bugzilla.suse.com/1076505"
},
{
"category": "external",
"summary": "SUSE Bug 1076506 for CVE-2017-10378",
"url": "https://bugzilla.suse.com/1076506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10378"
},
{
"cve": "CVE-2017-10384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10384"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10384",
"url": "https://www.suse.com/security/cve/CVE-2017-10384"
},
{
"category": "external",
"summary": "SUSE Bug 1064117 for CVE-2017-10384",
"url": "https://bugzilla.suse.com/1064117"
},
{
"category": "external",
"summary": "SUSE Bug 1064119 for CVE-2017-10384",
"url": "https://bugzilla.suse.com/1064119"
},
{
"category": "external",
"summary": "SUSE Bug 1076506 for CVE-2017-10384",
"url": "https://bugzilla.suse.com/1076506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10384"
},
{
"cve": "CVE-2017-3243",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3243"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3243",
"url": "https://www.suse.com/security/cve/CVE-2017-3243"
},
{
"category": "external",
"summary": "SUSE Bug 1020868 for CVE-2017-3243",
"url": "https://bugzilla.suse.com/1020868"
},
{
"category": "external",
"summary": "SUSE Bug 1020891 for CVE-2017-3243",
"url": "https://bugzilla.suse.com/1020891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3243"
},
{
"cve": "CVE-2017-3257",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3257"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.34 and earlier5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3257",
"url": "https://www.suse.com/security/cve/CVE-2017-3257"
},
{
"category": "external",
"summary": "SUSE Bug 1020868 for CVE-2017-3257",
"url": "https://bugzilla.suse.com/1020868"
},
{
"category": "external",
"summary": "SUSE Bug 1020878 for CVE-2017-3257",
"url": "https://bugzilla.suse.com/1020878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3257"
},
{
"cve": "CVE-2017-3265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3265"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3265",
"url": "https://www.suse.com/security/cve/CVE-2017-3265"
},
{
"category": "external",
"summary": "SUSE Bug 1020868 for CVE-2017-3265",
"url": "https://bugzilla.suse.com/1020868"
},
{
"category": "external",
"summary": "SUSE Bug 1020885 for CVE-2017-3265",
"url": "https://bugzilla.suse.com/1020885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3265"
},
{
"cve": "CVE-2017-3302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3302"
}
],
"notes": [
{
"category": "general",
"text": "Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3302",
"url": "https://www.suse.com/security/cve/CVE-2017-3302"
},
{
"category": "external",
"summary": "SUSE Bug 1022428 for CVE-2017-3302",
"url": "https://bugzilla.suse.com/1022428"
},
{
"category": "external",
"summary": "SUSE Bug 1034850 for CVE-2017-3302",
"url": "https://bugzilla.suse.com/1034850"
},
{
"category": "external",
"summary": "SUSE Bug 1034911 for CVE-2017-3302",
"url": "https://bugzilla.suse.com/1034911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3302"
},
{
"cve": "CVE-2017-3308",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3308"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3308",
"url": "https://www.suse.com/security/cve/CVE-2017-3308"
},
{
"category": "external",
"summary": "SUSE Bug 1034850 for CVE-2017-3308",
"url": "https://bugzilla.suse.com/1034850"
},
{
"category": "external",
"summary": "SUSE Bug 1048715 for CVE-2017-3308",
"url": "https://bugzilla.suse.com/1048715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3308"
},
{
"cve": "CVE-2017-3312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3312"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3312",
"url": "https://www.suse.com/security/cve/CVE-2017-3312"
},
{
"category": "external",
"summary": "SUSE Bug 1020868 for CVE-2017-3312",
"url": "https://bugzilla.suse.com/1020868"
},
{
"category": "external",
"summary": "SUSE Bug 1020873 for CVE-2017-3312",
"url": "https://bugzilla.suse.com/1020873"
},
{
"category": "external",
"summary": "SUSE Bug 998309 for CVE-2017-3312",
"url": "https://bugzilla.suse.com/998309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3312"
},
{
"cve": "CVE-2017-3313",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3313"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3313",
"url": "https://www.suse.com/security/cve/CVE-2017-3313"
},
{
"category": "external",
"summary": "SUSE Bug 1020868 for CVE-2017-3313",
"url": "https://bugzilla.suse.com/1020868"
},
{
"category": "external",
"summary": "SUSE Bug 1020890 for CVE-2017-3313",
"url": "https://bugzilla.suse.com/1020890"
},
{
"category": "external",
"summary": "SUSE Bug 1034911 for CVE-2017-3313",
"url": "https://bugzilla.suse.com/1034911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-3313"
},
{
"cve": "CVE-2017-3318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3318"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3318",
"url": "https://www.suse.com/security/cve/CVE-2017-3318"
},
{
"category": "external",
"summary": "SUSE Bug 1020868 for CVE-2017-3318",
"url": "https://bugzilla.suse.com/1020868"
},
{
"category": "external",
"summary": "SUSE Bug 1020896 for CVE-2017-3318",
"url": "https://bugzilla.suse.com/1020896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-3318"
},
{
"cve": "CVE-2017-3456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3456"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3456",
"url": "https://www.suse.com/security/cve/CVE-2017-3456"
},
{
"category": "external",
"summary": "SUSE Bug 1034850 for CVE-2017-3456",
"url": "https://bugzilla.suse.com/1034850"
},
{
"category": "external",
"summary": "SUSE Bug 1048715 for CVE-2017-3456",
"url": "https://bugzilla.suse.com/1048715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3456"
},
{
"cve": "CVE-2017-3636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3636"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3636",
"url": "https://www.suse.com/security/cve/CVE-2017-3636"
},
{
"category": "external",
"summary": "SUSE Bug 1049399 for CVE-2017-3636",
"url": "https://bugzilla.suse.com/1049399"
},
{
"category": "external",
"summary": "SUSE Bug 1049422 for CVE-2017-3636",
"url": "https://bugzilla.suse.com/1049422"
},
{
"category": "external",
"summary": "SUSE Bug 1054591 for CVE-2017-3636",
"url": "https://bugzilla.suse.com/1054591"
},
{
"category": "external",
"summary": "SUSE Bug 1076506 for CVE-2017-3636",
"url": "https://bugzilla.suse.com/1076506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3636"
},
{
"cve": "CVE-2018-2562",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2562"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2562",
"url": "https://www.suse.com/security/cve/CVE-2018-2562"
},
{
"category": "external",
"summary": "SUSE Bug 1076369 for CVE-2018-2562",
"url": "https://bugzilla.suse.com/1076369"
},
{
"category": "external",
"summary": "SUSE Bug 1078431 for CVE-2018-2562",
"url": "https://bugzilla.suse.com/1078431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-2562"
},
{
"cve": "CVE-2018-2668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2668"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2668",
"url": "https://www.suse.com/security/cve/CVE-2018-2668"
},
{
"category": "external",
"summary": "SUSE Bug 1076369 for CVE-2018-2668",
"url": "https://bugzilla.suse.com/1076369"
},
{
"category": "external",
"summary": "SUSE Bug 1078431 for CVE-2018-2668",
"url": "https://bugzilla.suse.com/1078431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2668"
},
{
"cve": "CVE-2018-2755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2755"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2755",
"url": "https://www.suse.com/security/cve/CVE-2018-2755"
},
{
"category": "external",
"summary": "SUSE Bug 1089987 for CVE-2018-2755",
"url": "https://bugzilla.suse.com/1089987"
},
{
"category": "external",
"summary": "SUSE Bug 1090518 for CVE-2018-2755",
"url": "https://bugzilla.suse.com/1090518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-2755"
},
{
"cve": "CVE-2018-2767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2767"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2767",
"url": "https://www.suse.com/security/cve/CVE-2018-2767"
},
{
"category": "external",
"summary": "SUSE Bug 1088681 for CVE-2018-2767",
"url": "https://bugzilla.suse.com/1088681"
},
{
"category": "external",
"summary": "SUSE Bug 1101675 for CVE-2018-2767",
"url": "https://bugzilla.suse.com/1101675"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2767"
},
{
"cve": "CVE-2018-2781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2781"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2781",
"url": "https://www.suse.com/security/cve/CVE-2018-2781"
},
{
"category": "external",
"summary": "SUSE Bug 1089987 for CVE-2018-2781",
"url": "https://bugzilla.suse.com/1089987"
},
{
"category": "external",
"summary": "SUSE Bug 1090518 for CVE-2018-2781",
"url": "https://bugzilla.suse.com/1090518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-2781"
},
{
"cve": "CVE-2018-2782",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2782"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2782",
"url": "https://www.suse.com/security/cve/CVE-2018-2782"
},
{
"category": "external",
"summary": "SUSE Bug 1089987 for CVE-2018-2782",
"url": "https://bugzilla.suse.com/1089987"
},
{
"category": "external",
"summary": "SUSE Bug 1090518 for CVE-2018-2782",
"url": "https://bugzilla.suse.com/1090518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-2782"
},
{
"cve": "CVE-2018-2786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2786"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2786",
"url": "https://www.suse.com/security/cve/CVE-2018-2786"
},
{
"category": "external",
"summary": "SUSE Bug 1089987 for CVE-2018-2786",
"url": "https://bugzilla.suse.com/1089987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-2786"
},
{
"cve": "CVE-2018-3058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3058"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3058",
"url": "https://www.suse.com/security/cve/CVE-2018-3058"
},
{
"category": "external",
"summary": "SUSE Bug 1101676 for CVE-2018-3058",
"url": "https://bugzilla.suse.com/1101676"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2018-3058",
"url": "https://bugzilla.suse.com/1116686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3058"
},
{
"cve": "CVE-2018-3060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3060"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3060",
"url": "https://www.suse.com/security/cve/CVE-2018-3060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3060"
},
{
"cve": "CVE-2018-3064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3064"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3064",
"url": "https://www.suse.com/security/cve/CVE-2018-3064"
},
{
"category": "external",
"summary": "SUSE Bug 1103342 for CVE-2018-3064",
"url": "https://bugzilla.suse.com/1103342"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2018-3064",
"url": "https://bugzilla.suse.com/1116686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-3064"
},
{
"cve": "CVE-2018-3156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3156"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3156",
"url": "https://www.suse.com/security/cve/CVE-2018-3156"
},
{
"category": "external",
"summary": "SUSE Bug 1112417 for CVE-2018-3156",
"url": "https://bugzilla.suse.com/1112417"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2018-3156",
"url": "https://bugzilla.suse.com/1116686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3156"
},
{
"cve": "CVE-2018-3162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3162"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3162",
"url": "https://www.suse.com/security/cve/CVE-2018-3162"
},
{
"category": "external",
"summary": "SUSE Bug 1112415 for CVE-2018-3162",
"url": "https://bugzilla.suse.com/1112415"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2018-3162",
"url": "https://bugzilla.suse.com/1116686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3162"
},
{
"cve": "CVE-2018-3174",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3174"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3174",
"url": "https://www.suse.com/security/cve/CVE-2018-3174"
},
{
"category": "external",
"summary": "SUSE Bug 1112368 for CVE-2018-3174",
"url": "https://bugzilla.suse.com/1112368"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2018-3174",
"url": "https://bugzilla.suse.com/1116686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3174"
},
{
"cve": "CVE-2018-3185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3185"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3185",
"url": "https://www.suse.com/security/cve/CVE-2018-3185"
},
{
"category": "external",
"summary": "SUSE Bug 1112384 for CVE-2018-3185",
"url": "https://bugzilla.suse.com/1112384"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2018-3185",
"url": "https://bugzilla.suse.com/1116686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3185"
},
{
"cve": "CVE-2018-3200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3200"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3200",
"url": "https://www.suse.com/security/cve/CVE-2018-3200"
},
{
"category": "external",
"summary": "SUSE Bug 1112404 for CVE-2018-3200",
"url": "https://bugzilla.suse.com/1112404"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2018-3200",
"url": "https://bugzilla.suse.com/1116686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3200"
},
{
"cve": "CVE-2018-3282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3282"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3282",
"url": "https://www.suse.com/security/cve/CVE-2018-3282"
},
{
"category": "external",
"summary": "SUSE Bug 1112432 for CVE-2018-3282",
"url": "https://bugzilla.suse.com/1112432"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2018-3282",
"url": "https://bugzilla.suse.com/1116686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3282"
},
{
"cve": "CVE-2019-18901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18901"
}
],
"notes": [
{
"category": "general",
"text": "A UNIX Symbolic Link (Symlink) Following vulnerability in the mysql-systemd-helper of the mariadb packaging of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allows local attackers to change the permissions of arbitrary files to 0640. This issue affects: SUSE Linux Enterprise Server 12 mariadb versions prior to 10.2.31-3.25.1. SUSE Linux Enterprise Server 15 mariadb versions prior to 10.2.31-3.26.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18901",
"url": "https://www.suse.com/security/cve/CVE-2019-18901"
},
{
"category": "external",
"summary": "SUSE Bug 1160285 for CVE-2019-18901",
"url": "https://bugzilla.suse.com/1160285"
},
{
"category": "external",
"summary": "SUSE Bug 1160895 for CVE-2019-18901",
"url": "https://bugzilla.suse.com/1160895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18901"
},
{
"cve": "CVE-2019-2503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2503"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection Handling). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Difficult to exploit vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.4 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2503",
"url": "https://www.suse.com/security/cve/CVE-2019-2503"
},
{
"category": "external",
"summary": "SUSE Bug 1122198 for CVE-2019-2503",
"url": "https://bugzilla.suse.com/1122198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-2503"
},
{
"cve": "CVE-2019-2510",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2510"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2510",
"url": "https://www.suse.com/security/cve/CVE-2019-2510"
},
{
"category": "external",
"summary": "SUSE Bug 1122198 for CVE-2019-2510",
"url": "https://bugzilla.suse.com/1122198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-2510"
},
{
"cve": "CVE-2019-2614",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2614"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2614",
"url": "https://www.suse.com/security/cve/CVE-2019-2614"
},
{
"category": "external",
"summary": "SUSE Bug 1132826 for CVE-2019-2614",
"url": "https://bugzilla.suse.com/1132826"
},
{
"category": "external",
"summary": "SUSE Bug 1136035 for CVE-2019-2614",
"url": "https://bugzilla.suse.com/1136035"
},
{
"category": "external",
"summary": "SUSE Bug 1141798 for CVE-2019-2614",
"url": "https://bugzilla.suse.com/1141798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-2614"
},
{
"cve": "CVE-2019-2758",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2758"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2758",
"url": "https://www.suse.com/security/cve/CVE-2019-2758"
},
{
"category": "external",
"summary": "SUSE Bug 1141798 for CVE-2019-2758",
"url": "https://bugzilla.suse.com/1141798"
},
{
"category": "external",
"summary": "SUSE Bug 1156669 for CVE-2019-2758",
"url": "https://bugzilla.suse.com/1156669"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2758"
},
{
"cve": "CVE-2019-2805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2805"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2805",
"url": "https://www.suse.com/security/cve/CVE-2019-2805"
},
{
"category": "external",
"summary": "SUSE Bug 1132826 for CVE-2019-2805",
"url": "https://bugzilla.suse.com/1132826"
},
{
"category": "external",
"summary": "SUSE Bug 1141798 for CVE-2019-2805",
"url": "https://bugzilla.suse.com/1141798"
},
{
"category": "external",
"summary": "SUSE Bug 1156669 for CVE-2019-2805",
"url": "https://bugzilla.suse.com/1156669"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2805"
},
{
"cve": "CVE-2019-2974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2974"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2974",
"url": "https://www.suse.com/security/cve/CVE-2019-2974"
},
{
"category": "external",
"summary": "SUSE Bug 1154162 for CVE-2019-2974",
"url": "https://bugzilla.suse.com/1154162"
},
{
"category": "external",
"summary": "SUSE Bug 1156669 for CVE-2019-2974",
"url": "https://bugzilla.suse.com/1156669"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-2974"
},
{
"cve": "CVE-2020-13249",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13249"
}
],
"notes": [
{
"category": "general",
"text": "libmariadb/mariadb_lib.c in MariaDB Connector/C before 3.1.8 does not properly validate the content of an OK packet received from a server. NOTE: although mariadb_lib.c was originally based on code shipped for MySQL, this issue does not affect any MySQL components supported by Oracle.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13249",
"url": "https://www.suse.com/security/cve/CVE-2020-13249"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-13249"
},
{
"cve": "CVE-2020-14789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14789"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14789",
"url": "https://www.suse.com/security/cve/CVE-2020-14789"
},
{
"category": "external",
"summary": "SUSE Bug 1178428 for CVE-2020-14789",
"url": "https://bugzilla.suse.com/1178428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14789"
},
{
"cve": "CVE-2020-14812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14812"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14812",
"url": "https://www.suse.com/security/cve/CVE-2020-14812"
},
{
"category": "external",
"summary": "SUSE Bug 1178428 for CVE-2020-14812",
"url": "https://bugzilla.suse.com/1178428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14812"
},
{
"cve": "CVE-2020-15180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15180"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system\u0027s confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15180",
"url": "https://www.suse.com/security/cve/CVE-2020-15180"
},
{
"category": "external",
"summary": "SUSE Bug 1177472 for CVE-2020-15180",
"url": "https://bugzilla.suse.com/1177472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15180"
},
{
"cve": "CVE-2020-2574",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2574"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2574",
"url": "https://www.suse.com/security/cve/CVE-2020-2574"
},
{
"category": "external",
"summary": "SUSE Bug 1161085 for CVE-2020-2574",
"url": "https://bugzilla.suse.com/1161085"
},
{
"category": "external",
"summary": "SUSE Bug 1162388 for CVE-2020-2574",
"url": "https://bugzilla.suse.com/1162388"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-2574"
},
{
"cve": "CVE-2020-2752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2752"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2752",
"url": "https://www.suse.com/security/cve/CVE-2020-2752"
},
{
"category": "external",
"summary": "SUSE Bug 1171550 for CVE-2020-2752",
"url": "https://bugzilla.suse.com/1171550"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-2752"
},
{
"cve": "CVE-2020-7221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7221"
}
],
"notes": [
{
"category": "general",
"text": "mysql_install_db in MariaDB 10.4.7 through 10.4.11 allows privilege escalation from the mysql user account to root because chown and chmod are performed unsafely, as demonstrated by a symlink attack on a chmod 04755 of auth_pam_tool_dir/auth_pam_tool. NOTE: this does not affect the Oracle MySQL product, which implements mysql_install_db differently.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7221",
"url": "https://www.suse.com/security/cve/CVE-2020-7221"
},
{
"category": "external",
"summary": "SUSE Bug 1160285 for CVE-2020-7221",
"url": "https://bugzilla.suse.com/1160285"
},
{
"category": "external",
"summary": "SUSE Bug 1160868 for CVE-2020-7221",
"url": "https://bugzilla.suse.com/1160868"
},
{
"category": "external",
"summary": "SUSE Bug 1160895 for CVE-2020-7221",
"url": "https://bugzilla.suse.com/1160895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-7221"
},
{
"cve": "CVE-2021-2154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2154"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2154",
"url": "https://www.suse.com/security/cve/CVE-2021-2154"
},
{
"category": "external",
"summary": "SUSE Bug 1185872 for CVE-2021-2154",
"url": "https://bugzilla.suse.com/1185872"
},
{
"category": "external",
"summary": "SUSE Bug 1199955 for CVE-2021-2154",
"url": "https://bugzilla.suse.com/1199955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-2154"
},
{
"cve": "CVE-2021-2372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2372"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2372",
"url": "https://www.suse.com/security/cve/CVE-2021-2372"
},
{
"category": "external",
"summary": "SUSE Bug 1188549 for CVE-2021-2372",
"url": "https://bugzilla.suse.com/1188549"
},
{
"category": "external",
"summary": "SUSE Bug 1189320 for CVE-2021-2372",
"url": "https://bugzilla.suse.com/1189320"
},
{
"category": "external",
"summary": "SUSE Bug 1199955 for CVE-2021-2372",
"url": "https://bugzilla.suse.com/1199955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2389"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2389",
"url": "https://www.suse.com/security/cve/CVE-2021-2389"
},
{
"category": "external",
"summary": "SUSE Bug 1188549 for CVE-2021-2389",
"url": "https://bugzilla.suse.com/1188549"
},
{
"category": "external",
"summary": "SUSE Bug 1189320 for CVE-2021-2389",
"url": "https://bugzilla.suse.com/1189320"
},
{
"category": "external",
"summary": "SUSE Bug 1199955 for CVE-2021-2389",
"url": "https://bugzilla.suse.com/1199955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd-devel-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:libmariadbd19-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-bench-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-client-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-errormessages-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-galera-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-rpm-macros-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-test-10.6.4-2.1.x86_64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.aarch64",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.ppc64le",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.s390x",
"openSUSE Tumbleweed:mariadb-tools-10.6.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-2389"
}
]
}
RHSA-2007:0083
Vulnerability from csaf_redhat - Published: 2007-02-19 19:41 - Updated: 2026-01-06 20:20MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
No description is available for this CVE.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine's definer instead of the routine's caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated MySQL packages for the Red Hat Application Stack comprising the v1.1\nrelease are now available.\n\nThis update also resolves some minor security issues rated as having low\nsecurity impact by the Red Hat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Several minor security issues were found in MySQL:\n\nMySQL allowed remote authenticated users to create or access a database\nwhen the database name differed only in case from a database for which they\nhad permissions. (CVE-2006-4226)\n\nMySQL evaluated arguments in the wrong security context which allowed\nremote authenticated users to gain privileges through a routine that had\nbeen made available using GRANT EXECUTE. (CVE-2006-4227)\n\nMySQL allowed a local user to access a table through a previously created\nMERGE table, even after the user\u0027s privileges were revoked for the original\ntable, which might violate intended security policy. (CVE-2006-4031)\n\nMySQL allowed authenticated users to cause a denial of service (crash) via\na NULL second argument to the str_to_date function. (CVE-2006-3081)\n\nMySQL allowed local authenticated users to bypass logging mechanisms via\nSQL queries that contain the NULL character, which were not properly\nhandled by the mysql_real_query function. (CVE-2006-0903)\n\nUsers of MySQL should upgrade to these updated packages, which resolve\nthese issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0083",
"url": "https://access.redhat.com/errata/RHSA-2007:0083"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "228999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=228999"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0083.json"
}
],
"title": "Red Hat Security Advisory: mysql security update",
"tracking": {
"current_release_date": "2026-01-06T20:20:29+00:00",
"generator": {
"date": "2026-01-06T20:20:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2007:0083",
"initial_release_date": "2007-02-19T19:41:00+00:00",
"revision_history": [
{
"date": "2007-02-19T19:41:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-02-19T14:51:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-06T20:20:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product": {
"name": "Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_stack:1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product": {
"name": "Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_stack:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Stack"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"product": {
"name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"product_id": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@5.0.30-1.el4s1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"product": {
"name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"product_id": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@5.0.30-1.el4s1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"product": {
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"product_id": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.30-1.el4s1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"product": {
"name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"product_id": "mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@5.0.30-1.el4s1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-0:5.0.30-1.el4s1.1.x86_64",
"product": {
"name": "mysql-0:5.0.30-1.el4s1.1.x86_64",
"product_id": "mysql-0:5.0.30-1.el4s1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@5.0.30-1.el4s1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"product": {
"name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"product_id": "mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@5.0.30-1.el4s1.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"product": {
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"product_id": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.30-1.el4s1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-0:5.0.30-1.el4s1.1.i386",
"product": {
"name": "mysql-0:5.0.30-1.el4s1.1.i386",
"product_id": "mysql-0:5.0.30-1.el4s1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@5.0.30-1.el4s1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-bench-0:5.0.30-1.el4s1.1.i386",
"product": {
"name": "mysql-bench-0:5.0.30-1.el4s1.1.i386",
"product_id": "mysql-bench-0:5.0.30-1.el4s1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@5.0.30-1.el4s1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:5.0.30-1.el4s1.1.i386",
"product": {
"name": "mysql-devel-0:5.0.30-1.el4s1.1.i386",
"product_id": "mysql-devel-0:5.0.30-1.el4s1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@5.0.30-1.el4s1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:5.0.30-1.el4s1.1.i386",
"product": {
"name": "mysql-server-0:5.0.30-1.el4s1.1.i386",
"product_id": "mysql-server-0:5.0.30-1.el4s1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@5.0.30-1.el4s1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:5.0.30-1.el4s1.1.i386",
"product": {
"name": "mysql-test-0:5.0.30-1.el4s1.1.i386",
"product_id": "mysql-test-0:5.0.30-1.el4s1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@5.0.30-1.el4s1.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-server-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-test-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-server-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-test-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-0903",
"discovery_date": "2006-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "194613"
}
],
"notes": [
{
"category": "description",
"text": "MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mysql log file obfuscation",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-0903"
},
{
"category": "external",
"summary": "RHBZ#194613",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=194613"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0903"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0903",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0903"
}
],
"release_date": "2006-02-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-02-19T19:41:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0083"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Mysql log file obfuscation"
},
{
"cve": "CVE-2006-3081",
"discovery_date": "2006-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618132"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3081"
},
{
"category": "external",
"summary": "RHBZ#1618132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618132"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3081"
}
],
"release_date": "2006-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-02-19T19:41:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0083"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-4031",
"discovery_date": "2006-08-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "202246"
}
],
"notes": [
{
"category": "description",
"text": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "MySQL improper permission revocation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1 or 3",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-4031"
},
{
"category": "external",
"summary": "RHBZ#202246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=202246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-4031",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4031"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031"
}
],
"release_date": "2005-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-02-19T19:41:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0083"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "MySQL improper permission revocation"
},
{
"cve": "CVE-2006-4226",
"discovery_date": "2006-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "203428"
}
],
"notes": [
{
"category": "description",
"text": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql-server create database privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect Red Hat Enterprise Linux 2.1 or 3",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-4226"
},
{
"category": "external",
"summary": "RHBZ#203428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=203428"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226"
}
],
"release_date": "2006-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-02-19T19:41:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0083"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql-server create database privilege escalation"
},
{
"cve": "CVE-2006-4227",
"discovery_date": "2006-08-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "216427"
}
],
"notes": [
{
"category": "description",
"text": "MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine\u0027s definer instead of the routine\u0027s caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql improper suid argument evaluation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-4227"
},
{
"category": "external",
"summary": "RHBZ#216427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=216427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-4227",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4227"
}
],
"release_date": "2006-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-02-19T19:41:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0083"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql improper suid argument evaluation"
}
]
}
RHSA-2007:0152
Vulnerability from csaf_redhat - Published: 2007-04-03 18:58 - Updated: 2025-11-21 17:31MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-bench-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-devel-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-server-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-server-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-server-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-bench-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-devel-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-server-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-server-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-server-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-server-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-bench-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-devel-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-server-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-server-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-server-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated mysql packages that fix a security flaw are now available for Red\nHat Enterprise Linux 4.\n\nThis update has been rated as having moderate security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\nclient/server implementation consisting of a server daemon (mysqld) and\nmany different client programs and libraries.\n\nA flaw was found in the way MySQL handled case sensitive database names. A\nuser with the ability to create databases could gain unauthorized access to\nother databases hosted by the MySQL server. (CVE-2006-4226)\n\nThis flaw does not affect the version of MySQL distributed with Red Hat\nEnterprise Linux 2.1, 3, or 5.\n\nAll users of the MySQL server are advised to upgrade to these updated\npackages, which contain a backported patch which fixes this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0152",
"url": "https://access.redhat.com/errata/RHSA-2007:0152"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "203426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=203426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0152.json"
}
],
"title": "Red Hat Security Advisory: mysql security update",
"tracking": {
"current_release_date": "2025-11-21T17:31:25+00:00",
"generator": {
"date": "2025-11-21T17:31:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0152",
"initial_release_date": "2007-04-03T18:58:00+00:00",
"revision_history": [
{
"date": "2007-04-03T18:58:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-04-03T14:58:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:31:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"product": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"product_id": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@4.1.20-2.RHEL4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"product": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"product_id": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@4.1.20-2.RHEL4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"product": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"product_id": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@4.1.20-2.RHEL4.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.i386",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.i386",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"product": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"product_id": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@4.1.20-2.RHEL4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"product": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"product_id": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@4.1.20-2.RHEL4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"product": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"product_id": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@4.1.20-2.RHEL4.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"product": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"product_id": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@4.1.20-2.RHEL4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"product": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"product_id": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@4.1.20-2.RHEL4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"product": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"product_id": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@4.1.20-2.RHEL4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.src",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.src",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"product": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"product_id": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@4.1.20-2.RHEL4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"product": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"product_id": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@4.1.20-2.RHEL4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"product": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"product_id": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@4.1.20-2.RHEL4.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"product": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"product_id": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@4.1.20-2.RHEL4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"product": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"product_id": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@4.1.20-2.RHEL4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"product": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"product_id": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@4.1.20-2.RHEL4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.s390",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"product": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"product_id": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@4.1.20-2.RHEL4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"product": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"product_id": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@4.1.20-2.RHEL4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"product": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"product_id": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@4.1.20-2.RHEL4.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.src"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-bench-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-devel-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-server-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-server-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-server-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.src"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.src"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-bench-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-devel-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-server-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-server-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-server-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-server-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.src"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-bench-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-devel-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-server-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-server-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-server-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-4226",
"discovery_date": "2006-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "203428"
}
],
"notes": [
{
"category": "description",
"text": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql-server create database privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect Red Hat Enterprise Linux 2.1 or 3",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS:mysql-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4AS:mysql-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-0:4.1.20-2.RHEL4.1.src",
"4AS:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.src",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4ES:mysql-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-0:4.1.20-2.RHEL4.1.src",
"4ES:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4WS:mysql-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-0:4.1.20-2.RHEL4.1.src",
"4WS:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-4226"
},
{
"category": "external",
"summary": "RHBZ#203428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=203428"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226"
}
],
"release_date": "2006-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-04-03T18:58:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:mysql-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4AS:mysql-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-0:4.1.20-2.RHEL4.1.src",
"4AS:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.src",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4ES:mysql-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-0:4.1.20-2.RHEL4.1.src",
"4ES:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4WS:mysql-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-0:4.1.20-2.RHEL4.1.src",
"4WS:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0152"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql-server create database privilege escalation"
}
]
}
RHSA-2007_0083
Vulnerability from csaf_redhat - Published: 2007-02-19 19:41 - Updated: 2024-11-22 01:46MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine's definer instead of the routine's caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated MySQL packages for the Red Hat Application Stack comprising the v1.1\nrelease are now available.\n\nThis update also resolves some minor security issues rated as having low\nsecurity impact by the Red Hat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Several minor security issues were found in MySQL:\n\nMySQL allowed remote authenticated users to create or access a database\nwhen the database name differed only in case from a database for which they\nhad permissions. (CVE-2006-4226)\n\nMySQL evaluated arguments in the wrong security context which allowed\nremote authenticated users to gain privileges through a routine that had\nbeen made available using GRANT EXECUTE. (CVE-2006-4227)\n\nMySQL allowed a local user to access a table through a previously created\nMERGE table, even after the user\u0027s privileges were revoked for the original\ntable, which might violate intended security policy. (CVE-2006-4031)\n\nMySQL allowed authenticated users to cause a denial of service (crash) via\na NULL second argument to the str_to_date function. (CVE-2006-3081)\n\nMySQL allowed local authenticated users to bypass logging mechanisms via\nSQL queries that contain the NULL character, which were not properly\nhandled by the mysql_real_query function. (CVE-2006-0903)\n\nUsers of MySQL should upgrade to these updated packages, which resolve\nthese issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0083",
"url": "https://access.redhat.com/errata/RHSA-2007:0083"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "228999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=228999"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0083.json"
}
],
"title": "Red Hat Security Advisory: mysql security update",
"tracking": {
"current_release_date": "2024-11-22T01:46:37+00:00",
"generator": {
"date": "2024-11-22T01:46:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2007:0083",
"initial_release_date": "2007-02-19T19:41:00+00:00",
"revision_history": [
{
"date": "2007-02-19T19:41:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-02-19T14:51:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T01:46:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product": {
"name": "Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_stack:1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product": {
"name": "Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_stack:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Stack"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"product": {
"name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"product_id": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@5.0.30-1.el4s1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"product": {
"name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"product_id": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@5.0.30-1.el4s1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"product": {
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"product_id": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.30-1.el4s1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"product": {
"name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"product_id": "mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@5.0.30-1.el4s1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-0:5.0.30-1.el4s1.1.x86_64",
"product": {
"name": "mysql-0:5.0.30-1.el4s1.1.x86_64",
"product_id": "mysql-0:5.0.30-1.el4s1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@5.0.30-1.el4s1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"product": {
"name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"product_id": "mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@5.0.30-1.el4s1.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"product": {
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"product_id": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.30-1.el4s1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-0:5.0.30-1.el4s1.1.i386",
"product": {
"name": "mysql-0:5.0.30-1.el4s1.1.i386",
"product_id": "mysql-0:5.0.30-1.el4s1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@5.0.30-1.el4s1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-bench-0:5.0.30-1.el4s1.1.i386",
"product": {
"name": "mysql-bench-0:5.0.30-1.el4s1.1.i386",
"product_id": "mysql-bench-0:5.0.30-1.el4s1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@5.0.30-1.el4s1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:5.0.30-1.el4s1.1.i386",
"product": {
"name": "mysql-devel-0:5.0.30-1.el4s1.1.i386",
"product_id": "mysql-devel-0:5.0.30-1.el4s1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@5.0.30-1.el4s1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:5.0.30-1.el4s1.1.i386",
"product": {
"name": "mysql-server-0:5.0.30-1.el4s1.1.i386",
"product_id": "mysql-server-0:5.0.30-1.el4s1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@5.0.30-1.el4s1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-test-0:5.0.30-1.el4s1.1.i386",
"product": {
"name": "mysql-test-0:5.0.30-1.el4s1.1.i386",
"product_id": "mysql-test-0:5.0.30-1.el4s1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-test@5.0.30-1.el4s1.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-server-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-test-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux AS (v.4)",
"product_id": "4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4AS-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-server-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:5.0.30-1.el4s1.1.i386 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386"
},
"product_reference": "mysql-test-0:5.0.30-1.el4s1.1.i386",
"relates_to_product_reference": "4ES-RHWAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-test-0:5.0.30-1.el4s1.1.x86_64 as a component of Red Hat Application Stack v1 for Enterprise Linux ES (v.4)",
"product_id": "4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
},
"product_reference": "mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"relates_to_product_reference": "4ES-RHWAS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-0903",
"discovery_date": "2006-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "194613"
}
],
"notes": [
{
"category": "description",
"text": "MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Mysql log file obfuscation",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-0903"
},
{
"category": "external",
"summary": "RHBZ#194613",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=194613"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0903"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0903",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0903"
}
],
"release_date": "2006-02-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-02-19T19:41:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0083"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Mysql log file obfuscation"
},
{
"cve": "CVE-2006-3081",
"discovery_date": "2006-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618132"
}
],
"notes": [
{
"category": "description",
"text": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3081"
},
{
"category": "external",
"summary": "RHBZ#1618132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618132"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3081"
}
],
"release_date": "2006-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-02-19T19:41:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0083"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-4031",
"discovery_date": "2006-08-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "202246"
}
],
"notes": [
{
"category": "description",
"text": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "MySQL improper permission revocation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1 or 3",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-4031"
},
{
"category": "external",
"summary": "RHBZ#202246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=202246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-4031",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4031"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4031"
}
],
"release_date": "2005-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-02-19T19:41:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0083"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "MySQL improper permission revocation"
},
{
"cve": "CVE-2006-4226",
"discovery_date": "2006-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "203428"
}
],
"notes": [
{
"category": "description",
"text": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql-server create database privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect Red Hat Enterprise Linux 2.1 or 3",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-4226"
},
{
"category": "external",
"summary": "RHBZ#203428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=203428"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226"
}
],
"release_date": "2006-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-02-19T19:41:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0083"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql-server create database privilege escalation"
},
{
"cve": "CVE-2006-4227",
"discovery_date": "2006-08-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "216427"
}
],
"notes": [
{
"category": "description",
"text": "MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine\u0027s definer instead of the routine\u0027s caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql improper suid argument evaluation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-4227"
},
{
"category": "external",
"summary": "RHBZ#216427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=216427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-4227",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4227"
}
],
"release_date": "2006-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-02-19T19:41:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4AS-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-bench-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-debuginfo-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-devel-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-server-0:5.0.30-1.el4s1.1.x86_64",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.i386",
"4ES-RHWAS:mysql-test-0:5.0.30-1.el4s1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0083"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql improper suid argument evaluation"
}
]
}
RHSA-2007_0152
Vulnerability from csaf_redhat - Published: 2007-04-03 18:58 - Updated: 2024-11-22 00:58MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-bench-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-devel-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-server-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-server-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-server-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-bench-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-devel-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-server-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-server-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-server-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:mysql-server-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-bench-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-devel-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-server-0:4.1.20-2.RHEL4.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-server-0:4.1.20-2.RHEL4.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-server-0:4.1.20-2.RHEL4.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated mysql packages that fix a security flaw are now available for Red\nHat Enterprise Linux 4.\n\nThis update has been rated as having moderate security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "MySQL is a multi-user, multi-threaded SQL database server. MySQL is a\nclient/server implementation consisting of a server daemon (mysqld) and\nmany different client programs and libraries.\n\nA flaw was found in the way MySQL handled case sensitive database names. A\nuser with the ability to create databases could gain unauthorized access to\nother databases hosted by the MySQL server. (CVE-2006-4226)\n\nThis flaw does not affect the version of MySQL distributed with Red Hat\nEnterprise Linux 2.1, 3, or 5.\n\nAll users of the MySQL server are advised to upgrade to these updated\npackages, which contain a backported patch which fixes this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0152",
"url": "https://access.redhat.com/errata/RHSA-2007:0152"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "203426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=203426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0152.json"
}
],
"title": "Red Hat Security Advisory: mysql security update",
"tracking": {
"current_release_date": "2024-11-22T00:58:57+00:00",
"generator": {
"date": "2024-11-22T00:58:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2007:0152",
"initial_release_date": "2007-04-03T18:58:00+00:00",
"revision_history": [
{
"date": "2007-04-03T18:58:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-04-03T14:58:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T00:58:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"product": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"product_id": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@4.1.20-2.RHEL4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"product": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"product_id": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@4.1.20-2.RHEL4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"product": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"product_id": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@4.1.20-2.RHEL4.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.i386",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.i386",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"product": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"product_id": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@4.1.20-2.RHEL4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"product": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"product_id": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@4.1.20-2.RHEL4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"product": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"product_id": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@4.1.20-2.RHEL4.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"product": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"product_id": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@4.1.20-2.RHEL4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"product": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"product_id": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@4.1.20-2.RHEL4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"product": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"product_id": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@4.1.20-2.RHEL4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.src",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.src",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"product": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"product_id": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@4.1.20-2.RHEL4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"product": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"product_id": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@4.1.20-2.RHEL4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"product": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"product_id": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@4.1.20-2.RHEL4.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"product": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"product_id": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@4.1.20-2.RHEL4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"product": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"product_id": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@4.1.20-2.RHEL4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"product": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"product_id": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@4.1.20-2.RHEL4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "mysql-0:4.1.20-2.RHEL4.1.s390",
"product": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390",
"product_id": "mysql-0:4.1.20-2.RHEL4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql@4.1.20-2.RHEL4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"product": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"product_id": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-debuginfo@4.1.20-2.RHEL4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"product": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"product_id": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-bench@4.1.20-2.RHEL4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"product": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"product_id": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-devel@4.1.20-2.RHEL4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"product": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"product_id": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mysql-server@4.1.20-2.RHEL4.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.src"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-bench-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-devel-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-server-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-server-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-server-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.src"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.src"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-bench-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-devel-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-server-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-server-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-server-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mysql-server-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.src"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-bench-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-devel-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-server-0:4.1.20-2.RHEL4.1.i386"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-server-0:4.1.20-2.RHEL4.1.ia64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-server-0:4.1.20-2.RHEL4.1.ppc"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390x"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64"
},
"product_reference": "mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-4226",
"discovery_date": "2006-08-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "203428"
}
],
"notes": [
{
"category": "description",
"text": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql-server create database privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect Red Hat Enterprise Linux 2.1 or 3",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS:mysql-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4AS:mysql-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-0:4.1.20-2.RHEL4.1.src",
"4AS:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.src",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4ES:mysql-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-0:4.1.20-2.RHEL4.1.src",
"4ES:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4WS:mysql-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-0:4.1.20-2.RHEL4.1.src",
"4WS:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-4226"
},
{
"category": "external",
"summary": "RHBZ#203428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=203428"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4226"
}
],
"release_date": "2006-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-04-03T18:58:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:mysql-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4AS:mysql-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-0:4.1.20-2.RHEL4.1.src",
"4AS:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4AS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.src",
"4Desktop:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4Desktop:mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4ES:mysql-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-0:4.1.20-2.RHEL4.1.src",
"4ES:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4ES:mysql-server-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-0:4.1.20-2.RHEL4.1.ppc64",
"4WS:mysql-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-0:4.1.20-2.RHEL4.1.src",
"4WS:mysql-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-bench-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.ppc64",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-debuginfo-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-devel-0:4.1.20-2.RHEL4.1.x86_64",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.i386",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.ia64",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.ppc",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.s390x",
"4WS:mysql-server-0:4.1.20-2.RHEL4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0152"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql-server create database privilege escalation"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.