{"id":"CVE-2016-0651","details":"Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.","modified":"2026-05-18T05:48:00.015221109Z","published":"2016-04-21T10:59:19.100Z","related":["SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2016:1279-1","SUSE-SU-2016:1619-1","SUSE-SU-2016:1620-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"42.1"}],"vendor_product":"opensuse:leap","source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"13.2"}],"vendor_product":"opensuse:opensuse","source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.0"}],"vendor_product":"redhat:enterprise_linux_desktop","source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.2"},{"last_affected":"7.3"},{"last_affected":"7.4"},{"last_affected":"7.5"},{"last_affected":"7.6"},{"last_affected":"7.7"}],"vendor_product":"redhat:enterprise_linux_eus","source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.0"}],"vendor_product":"redhat:enterprise_linux_server","source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.2"},{"last_affected":"7.3"},{"last_affected":"7.4"},{"last_affected":"7.6"},{"last_affected":"7.7"}],"vendor_product":"redhat:enterprise_linux_server_aus","source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.2"},{"last_affected":"7.3"},{"last_affected":"7.6"},{"last_affected":"7.7"}],"vendor_product":"redhat:enterprise_linux_server_tus","source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.0"}],"vendor_product":"redhat:enterprise_linux_workstation","source":"CPE_FIELD"},{"cpes":["cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"11-sp4"}],"vendor_product":"suse:linux_enterprise_debuginfo","source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"12-NA"},{"last_affected":"12-sp1"}],"vendor_product":"suse:linux_enterprise_desktop","source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"11-sp4"},{"last_affected":"12-NA"},{"last_affected":"12-sp1"}],"vendor_product":"suse:linux_enterprise_server","source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"11-sp4"},{"last_affected":"12-NA"},{"last_affected":"12-sp1"}],"vendor_product":"suse:linux_enterprise_software_development_kit","source":"CPE_FIELD"},{"cpes":["cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*","cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"12"},{"last_affected":"12-sp1"}],"vendor_product":"suse:linux_enterprise_workstation_extension","source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1035606"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"40ae1b9b618fbbc3b494a896a9d074b74e414337"},{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"89a264809d660fb5a4e7d43e9324b1f529a3a1d7"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"8efdfc8b58a84f8e8d62f0bb8b31f5b763664c06"}],"database_specific":{"extracted_events":[{"introduced":"5.5.0"},{"fixed":"5.5.47"},{"introduced":"10.0.0"},{"fixed":"10.0.23"},{"introduced":"10.1.0"},{"fixed":"10.1.10"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"}}],"versions":["mariadb-10.1.9","mariadb-10.1.8","mariadb-10.1.7","mariadb-10.1.6","mariadb-10.1.5","mariadb-10.1.4","mariadb-10.1.3","mariadb-10.1.2","mariadb-10.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-0651.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"54df0057e18d8c82c23fbd4e0bf5b5dc2e762955"},{"last_affected":"b9768521bdeb1a8069c7b871f4536792b65fd79b"}],"database_specific":{"extracted_events":[{"introduced":"5.5.0"},{"last_affected":"5.5.46"}],"cpe":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-0651.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}