{"id":"CVE-2016-0505","details":"Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.","modified":"2026-05-15T12:00:04.134642458Z","published":"2016-01-21T03:00:53.573Z","related":["SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2016:0348-1","SUSE-SU-2016:1619-1","SUSE-SU-2016:1620-1","openSUSE-SU-2024:10200-1","openSUSE-SU-2024:11038-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"],"vendor_product":"canonical:ubuntu_linux","source":"CPE_FIELD","extracted_events":[{"last_affected":"12.04"},{"last_affected":"14.04"},{"last_affected":"15.04"},{"last_affected":"15.10"}]},{"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}]},{"cpes":["cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"],"vendor_product":"opensuse:leap","source":"CPE_FIELD","extracted_events":[{"last_affected":"42.1"}]},{"cpes":["cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"],"vendor_product":"opensuse:opensuse","source":"CPE_FIELD","extracted_events":[{"last_affected":"13.2"}]},{"cpes":["cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"],"vendor_product":"oracle:linux","source":"CPE_FIELD","extracted_events":[{"last_affected":"7"}]},{"cpes":["cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"],"vendor_product":"oracle:solaris","source":"CPE_FIELD","extracted_events":[{"last_affected":"11.3"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux","source":"CPE_FIELD","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_desktop","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_hpc_node","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_hpc_node_eus","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.2"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server_aus","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.2"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_server_eus","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.2"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux_workstation","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3459"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/81088"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1034708"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2881-1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"type":"FIX","url":"http://www.debian.org/security/2016/dsa-3453"}],"schema_version":"1.7.5"}