{"id":"CVE-2016-3615","details":"Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: DML.","modified":"2026-05-15T12:01:27.347025200Z","published":"2016-07-21T10:14:49.613Z","related":["SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2016:2218-1","SUSE-SU-2016:2248-1","SUSE-SU-2016:2343-1","openSUSE-SU-2024:10200-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"12.04"},{"last_affected":"14.04"},{"last_affected":"15.10"},{"last_affected":"16.04"}],"cpes":["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"],"vendor_product":"canonical:ubuntu_linux","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"2.1"},{"last_affected":"3.1"}],"cpes":["cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"],"vendor_product":"ibm:powerkvm","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7"}],"cpes":["cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"],"vendor_product":"oracle:linux","source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1601.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1603.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1604.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1637.html"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3624"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3632"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91787"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91960"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1036362"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3040-1"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/"},{"type":"ADVISORY","url":"https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}