{"id":"CVE-2016-0647","details":"Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.","modified":"2026-05-15T12:00:16.845456783Z","published":"2016-04-21T10:59:15.490Z","related":["SUSE-SU-2016:1279-1","SUSE-SU-2016:1619-1","SUSE-SU-2016:1620-1","openSUSE-SU-2024:10200-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"8.0"}],"vendor_product":"debian:debian_linux","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"2.1"},{"last_affected":"3.1"}],"cpes":["cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"],"vendor_product":"ibm:powerkvm","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"42.1"}],"cpes":["cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"],"vendor_product":"opensuse:leap","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7"}],"cpes":["cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"],"vendor_product":"oracle:linux","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:enterprise_linux","source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3557"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3595"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/86495"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1035606"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2953-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2954-1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}